Write a 4- to 6-page discussion of how policies are used to implement a security plan.
Description of security planning policies
Description of how human resources security is included in security planning.
Description of how cryptographic tools may be included in security planning.
Application of security planning policies to manage security.
Evaluation of how specific policies are used to implement security plans.