Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
Q W E S G O U V X O E R M Y Y Y D D L Y C
Y K F T V P N I O V T J Q W J C Q F E S G
J W U A S D K M C B X G B F A W J Q S R D
R D E F E E P M G Y Q V O U G H G T U D W
T O H F R T O L S E K K B Y W I W G S S G
E O J R U E S L G C O K Q D N O R V I C W
N P W E D C F T T H S I V F U T L E M O W
Y R H S E T P N A W O E N F P B B X F K I
Y M X P C I X Q T L Q V J L H J O P O A D
J P A O O O S I Q F I V E S H A U P N P G
H W Q N R N Q I I S O C S B J H I K O H S
B K K S P O X T B V F A I W B K T L I P M
D X I I Y F M A F F I B W C H E J I T K O
L D E B N M J M T G I A T D J L M N N V G
K T U I A I U N E H Q B D D E I L U E A E
F X S L P S L T I J U M K N I O E F V R O
O O V I M U G D D S K B Q Y V R I O E V Y
K U Q T O S S K T I G C I S J P T N R A I
K O S Y C E U D P E I B O F F H V P P W G
Y X M U I Y D J S M V A W H O M B I O A Q
B E E S L H C H C I P J I Y U G R D N V M

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »