Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
  • Created by: Callum
  • Created on: 14-05-13 09:52
C B I P R U E W E S O V D X S A C A F D P
Y C X R P J R F E P G T X H T Q J L X U D
S L N C S N D B I R V N Y M A N T Q Q D O
E I H T L U E D I E S L G N F I W I M X N
R R X S U P T S I V E K M U F X M S N R O
U L W H B U E P P E G C C U R M R J C C E
D J Y V U B C C N N O B J Q E U A I F M D
E P W J A B T R G T H E C E S K T B T E R
C W Q U E E I Q R I X B R A P B M K C X F
O N T R A F O Y U O I Q Q F O R S X U P I
R O C D U J N L I N H A F M N N J M Y B O
P F J I W H O X S O T F A K S E C O V R F
Y G O Q L S F G F F E G R N I I J F S S K
N K Q S G G M D J M H D B C B M E A Y C W
A R S P L X I X L I H G A G I R I P N E D
P N I W N J S M G S D F T K L G R I X C R
M O B U L R U B B U X G E R I O T I F W Y
O J K N P B S G C S C T U W T Q V B I Y O
C U I X P V E T E E O T C V Y P S N E F Y
L A F U X B O W L R S J C N F T D U E L J
U Q M F D C J B Y Q C F L L A W S W F E M

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »