Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
C C A Y H U A H A L W V P J P K L J W H M
T D C T F T P B R F W N R U X S N V Y O R
P I W I B U W S X U U P E U C E H A D S G
I K P L R N E R D H D V V H W R V V E I L
F F L I A W D R D E W C E B L U S U T M H
D A A B Y S A R E I L V N M H D L M E I S
A C H I X X B W K T K U T K M E M O C A R
K N Q S N W E R V E I Q I X X C Y R T L T
Q O N N H B T U A K A V O B F O T X I O T
X N A O N D W N M D R B N C D R Y L O Y D
C K C P G O B Y X I F Y O N V P M T N B I
D A C S L E V U M H T V F J V Y C N O T N
D P R E G Q K M R J N L M K O N M B F C Y
M M M R S Y V F V U Y F I R W A O X M H Y
Q D N F N J J T R N G M S I X P T U I F U
O L J F C L P O O U W S U R S M S R S C F
K H K A N N U G H V Q U S O T O F V U T T
K H I T W M H U M I N H E N D C K E S Q T
W E R S R J E P F S G E K C I T X B E C Y
F I Y K H A W J V L M Y I V W Y O X V X T
I J K Y W Q N C P J G P Q A Y Y R X E G F

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »