Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
C X F W T A B R L N X H O C R S F S V U H
E D R V E B L E I G S U G M I V R U H M D
C J O N Q T X K S S B W Y F U W T D L L A
A Y G A X D C F F X U J F E O C L W U N Y
Q X D R L J X C M Y A C U S K P P G J I E
M D S F K Q C S X W Y L D H W S I T K B T
U P J A R A C M R H D X K D X M D O T J O
S B I H D K X R W M G B U K T J L G W L V
A P R E V E N T I O N O F M I S U S E W S
D E T E C T I O N O F M I S U S E B R U C
Q V E R S G L O T F G R Y U O H Q N G N D
M E W V Y E S F P P T P B P F D K E U M K
C S T A F F R E S P O N S I B I L I T Y Q
I E J U Y T G I M L V B T K W C X X Y L M
H E P L C J R B U H I V P Y N F P M C Q P
C O M P A N Y P R O C E D U R E S G G S C
W E B R O W X X B P N Y Y Y F K T N A Y T
C F I K C G F H S F E J G J G Q E F M B V
O Y M X J Y K K Q B A X E L W B B B M E Q
P K O N V K P F P U M W U U G Q W G X G T
U J T V W Q P E X A H K N R H M D B R A T

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »