Analyze,the strengths and weaknesses of two existing IT Security Policies published by state governments (agencies and offices of the executive branch under the leadership of the state governors).

For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments (agencies and offices of the executive branch under the leadership of the state governors). You may choose any two states’ IT Security Policies from the list published by the Multi-State Information Sharing and Analysis Center (MSISAC). (See item #1 under Research.)