0
0
Cybersecurityknowledge~30 mins

Security policy development in Cybersecurity - Mini Project: Build & Apply

Choose your learning style9 modes available
Security Policy Development
📖 Scenario: You are part of a small company that wants to protect its computer systems and data. To do this, you need to create a clear security policy that everyone in the company can follow.
🎯 Goal: Build a simple security policy document step-by-step that covers key areas like password rules, device use, and data protection.
📋 What You'll Learn
Create a list of key security topics
Add a rule for each topic
Organize the rules into a clear structure
Include a final statement about policy enforcement
💡 Why This Matters
🌍 Real World
Security policies help companies protect their data and systems by setting clear rules everyone must follow.
💼 Career
Understanding how to develop and organize security policies is important for roles in IT security, compliance, and management.
Progress0 / 4 steps
1
Create a list of security topics
Create a list called security_topics with these exact items: 'Password Policy', 'Device Usage', 'Data Protection'.
Cybersecurity
Need a hint?

Use square brackets to create a list and include the exact strings inside quotes.

2
Add rules for each security topic
Create a dictionary called security_rules where the keys are the items from security_topics and the values are these exact rules:
For 'Password Policy': 'Use strong passwords with at least 8 characters.'
For 'Device Usage': 'Only use company-approved devices.'
For 'Data Protection': 'Encrypt sensitive data at rest and in transit.'
Cybersecurity
Need a hint?

Use curly braces to create a dictionary and match each topic to its rule exactly.

3
Organize the policy into a numbered list
Create a list called policy_document that contains strings combining the topic and its rule in this exact format: "1. Password Policy: Use strong passwords with at least 8 characters.", "2. Device Usage: Only use company-approved devices.", and "3. Data Protection: Encrypt sensitive data at rest and in transit.". Use a for loop with enumerate over security_topics to build this list.
Cybersecurity
Need a hint?

Use enumerate starting at 1 to number the topics and format the string with f-strings.

4
Add a final enforcement statement
Add a string to the end of policy_document that says exactly: 'All employees must follow this security policy to keep company data safe.'
Cybersecurity
Need a hint?

Use the append method to add the exact final statement string to the list.