Discussion
IT infrastructure security policies are represented in many types of policy documents, depending on the organization's network and infrastructure needs. These differences stem from different cybersecurity risks. Discuss the basic anotomy of an infracture policy and the common Workstation Domain policies.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.