Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
E V B G K P U S Y N L I D E C V E P R P D
S A E U M P H E I T S E J T O U G Y L Q C
U V M O T M F C L P T R M E M B P P L C C
S T J O V N R O J L A B L D P X R I R H N
I N D O J I M K W G F S H R A J E K A H P
M Q W B D C H E H X F L P J N Y V C G L H
F D P V M C N V U T R R K L Y B E A I B F
O G U T Y O M L M M E O I C P T N C K I J
N T W M Y M F O Y H S O C K R T T A E B O
O R O D X K J X G Q P X C X O R I E F D D
I F D A I Q X E B G O I O S C X O E X T P
T Q Y E H Y V U J S N D D Q E K N A C Q N
C R B W G P O D U K S K K M D R O C Q V M
E L M V O B C D Q D I Y O E U W F S F P N
T F P W P L X G E X B A I E R Y M A M I W
E J G T Q M R P B K I P Y S E L I Q E I Q
D J B F B Q F F G N L W K E S I S O B J R
J J U V S D S N Q J I T Q H T O U U D V K
H I B E M G O P Y M T O Q G O H S H Y Y S
Q J W M M Y Q L O K Y V K V I Y E Y W N R
R V N G E Q O F U X X X W T P E G E V J Y

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »