Review Section 1.3 on effective versus ineffective security governance in Westby, J. R., and Allen, J. H. (2007), Governing for Enterprise Security (GES) Implementation Guide, which is located in your Module 3 readings (and available online from ).   Compare and contrast the effectiveness criteria in Table 1 on pp. 8-9 of Westby and Allen (2007) with Table 25.3 on pp. 287-288 of Hopkin (2014).  Be sure to identify any effectiveness criteria from Westby and Allen (2007) that you believe should be added to the criteria outlined in Hopkin (2014). 

For This or a Similar Paper Click Here To Order Now