1. Outline some of the software development policies in terms of security and discuss how it could be implemented in an organization.
2. Use Visio or any software you are familiar with to create the security administration cycle as found on page 220 of our book. Note: you can recreate it with any shape, but you have to provide detailed explanations on what you did.