Security policies are common within organizations that focus on providing a secure computing environment. Imagine that you are tasked with drafting a security policy for an organization of your choice. Draft a security policy for an existing or fictitious organization. You have viewed some sample policies at http://www.sans.org/security-resources/policies/.
In your response, comment on the need and rationale for each of the following types of policies:
1. Acceptable use policy (AUP)
2. Risk Assessment Policy
3. Remote Access Policy
In your paper, ensure that you describe the significance and purpose of the three policy documents listed above and explain how they relate to your selected chosen organization. Your response should be five to six pages in APA style.