Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
B Y D F J C U W C E A X C J B O T V V B W
V T X S D H T V X B V T G Y L N S D B M D
S W B F V Q Q Q W S P B M J P T Y M S V N
P D B X V V D K C S U R F G B S G A Q F V
D N X U P T M K Y N U Q V F B F W S T R O
D E X I F D C E K B E P K X V Q G J F L D
V U E L P P C A T R S S V L R F A A V D U
P I L A A K D X M N N S E G P X R X W D V
U T T R P X A L V O L U J M I I B Y P M Y
A C S F P M Y X U D J B F H A G O T N K K
J S T A F F R E S P O N S I B I L I T Y I
P E D F W U W B K J N M X T D X F E Y P G
H A R Q B J E V H W B E W K T H H J B R Q
P R E V E N T I O N O F M I S U S E J Y L
Q S Y R W E N E I Q U I Y O K J O E K L K
C O M P A N Y P R O C E D U R E S C Q B Y
C O D E T E C T I O N O F M I S U S E T F
J W P R P T E T D H I T A I F J G S I Q N
F W C S W B C F H A E S O N I N S Y C Y O
E D A T L U M I L W Q Q X T R I K O A A L
J D V E R D D N D R N O X X I Q E X A Q X

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »