Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
K V L F L Q I R O S K N D N W W L G F P V
F L L P C W E H B N K P I Q M S C P Q R R
N R A V G O I Y F U N A G V E T O R F B C
I I T G V N M S Y P M X J D T A M E X E K
K K W L U X M C X F X R T E U F P V L F M
P E K E R Y I M V W S E L T F F A E G O B
U E F Y Q N G L V X E C L E O R N N V G A
P J X X O U G E J R A R W C E E Y T D J B
A W V A Q M A I V K G S H T H S P I W H M
L O B X R J X F N T E G M I A P R O S P E
P S J V X P G N N J M C A O C O O N A J G
X M H U P T R Y G C X W C N L N C O O D E
X O I G C H D G I A G G L O P S E F Q G K
J H V O U R D B G L S B X F X I D M I O U
E L H Y G R I U L Y R R W M A B U I N T T
Q D R M S J V V M W D K Q I Y I R S J V D
X A B K Y P S C G M M K D S P L E U W G K
T R G O N U L P X N R B R U F I S S O T O
I P R W W S B O L J C K Y S L T H E N O B
E E A A N H B O X M G L G E J Y T M C B J
X W Q G U H A Q R K Q K G E C H H S I B N

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »