Introduction
An I.T security program, just like any other program in an organization, begins with objectives and strategies. The organization establishes security aims (objectives); how secure the I.T systems should be? Who should have access to the system? These objectives are then translated into possible courses of actions (strategies) that ensure the fulfillment of these objectives; How to achieve that level of security? The strategies are then written down as policies that govern the allocation of resources towards implementing security and the routine processes involved to that effect. This paper attempts to focus on the level of expertise, skills and ...