Recognize each of the 12 principles of information security and how each can be applied to real-life situations. Write the explanation of the four kinds of security policies. Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?