Chapter 1 provided a high-level overview of the Information Systems Security Policy Management: Information Systems Security (ISS). What is it? The act of protecting information and the systems that store, process and transmit Why is ISS needed? ISS provides a foundation for establishing protection of systems and data against risks such as: Unauthorized access and Use, Disclosure, System Disruption, Modification or Corruption Destruction After reading chapter 1 and looking at the ISS Management Life Cycle. Lets look at a real-world scenario and discuss what C-I-A Triad is all about. You must do the following: 1) Create a new thread. As indicated above,