Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
?
  • Created by: Callum
  • Created on: 14-05-13 09:52
G U R N E M P A U T N M G U B I E Y D X M
I X P Q S S R H E D U B O T P C S T P I D
B L H D E W E C F P T B X R C I U I P C W
S M K O R G V P T M T F P Q A B S L T N V
B X J F U D E D I F X P I K J U I I V E B
C F T P D S N X W X N K O Y D R M B L R H
O U V O E Q T R P J A X H T J J F I O J G
S D S R C P I D W T R U F M Y D O S W P R
M O O R O P O T A B M P H O T N N N F B C
H T F H R B N I Q E L V O B J V O O V S F
O R E B P T O B P J W P V V W Y I P R K X
F J A D Y I F D R Y H F C Q U Q T S A T A
I O L M N A M S S U T G X I J J C E Y Q F
X X Q D A I I X P I O E L B P F E R N C P
K R U J P P S T J G G S D R J V T F B I V
K E L Q M K U B X P P T E V P Y E F G T U
I K H A O B S F X V T G D P W L D A F E V
A D Y F C E E N G T O O Q U C N X T I Y T
U G F P G U Y I F H B B S A G B R S F K F
A T O Q A L N B H S S W C E G W A K N N O
R K G O W B O G R V K T W K G Y V P N K R

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »