Discussion Forum
Research the IT security policy used by your university or by some other organization you are associated with. Which of the topics listed in this section does your university IT policy addresses? If possible, identify any legal or regulatory requirements that apply to the organization. Do you believe the policy appropriately addresses all relevant issues? Are there any topics the policy should address? Specifically, think of and give a real-life scenario portraying the following concepts:
1. CISO (Chief Information Security Officer)
2. Malware Analyst
Define what a table join is and explain the different types of table joins. How are foreign keys used in table joins? Why would you want to use table joins?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.