Discussion Post
1. Outline some of the software development policies in terms of security and discuss how it could be implemented in an organization.
2. Use Visio or any software you are familiar with to create the security administration cycle as found on page 220 of our book. Note: you can recreate it with any shape, but you have to provide detailed explanations on what you did.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.