Discuss information security policy and the characteristics of asuccessful policy. Discuss Information Security Policylifecycle.