Security Best Practices
Please answer the following questions in your in your own words. Please cite any sources that you may use. 1. Describe an acceptable use policy. 2. What are the main components that are required to ensure that it meets security best practices?
