Tech Home

Information Security



1. List and describe the three challenges in shaping policy.



2. List and describe the three guidelines for sound policy, as stated by Bergeron and BÉrubÉ.



3. Describe the bull’s-eye model. What does it say about policy in the InfoSec program?



The bull’s eye model emphasizes the role of policy on an InfoSec program. Since organizations are different sizes and have different needs for policy, it is only right that each organization has the best policy to ensure no confusion, or the demoralization of employees occurs. As a result, the bull’s eye model provides a proven mechanism for prioritizing complex changes. Issues are addressed by moving from general to the specific, always starting with policy. As such, its four steps are policies, networks, systems and finally applications. By making sure that policies are set and right, then organizations can move on and protect the other aspects of the organization without being too stringent or demoralizing employees.


4. In what way are policies different from standards?



Policies are a set of rules that dictate acceptable and unacceptable behavior within an organization while standards clarify and define exactly what it means and what the organization will do to stop the behavior.


5. In what way are policies different from procedures?



Policies are a set of rules that dictate acceptable and unacceptable behavior within an organization while procedures explain how employees are to comply with the said policy.



Return to Top