Define the role of an information systems security (ISS) policy
Create a relevant system security policy
Then create a table with 8 Issue Specific and 8 System Specific policies. Determine and explain the relevance of each, explain in detail the steps you will take to implement, enforce, and update. List any issues that you think will hinder the implementation of the policies.