Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
P S T A F F R E S P O N S I B I L I T Y K
E R I J T T T L F A M O C E D R I D C G X
S C L H I A O P Q B C N B W K F N E R G J
U U Y S K O V P I S X L L O W G C P P K O
S Y M F X M Y M T L L W P Y U W R O S O G
I P J J K F N D B G B L B V V A M I G B A
M D E T E C T I O N O F M I S U S E P W N
F F O O D E U W N Q D S E B E S K C R V D
O T C Y W D L T K A U M K F L R E Y W H X
N Y Y L U K P P S W B E M D F F B H O E A
O R C Q B U G N X V J P L Q M F J I H W B
I Q C O M P A N Y P R O C E D U R E S W M
T J P O G T O D T D Y J P V E B K O B I G
N Y X I T K W Y A Q N T P X H N J Y K G P
E P H O W S A W R Y N Q M A N C N H L R R
V A D O Q S X K F N G X G H W E V S T T P
E Q G N T X R U C V W G W D O Y E I M H T
R D N F W T R B U A M L L R D P Y M T Y C
P J T U C F T Y R M L H L E W X U A O Q M
R O D B D U M S J F A T H J W G B T V A N
F M S D J W G D Q P C K B F K Q J H V U S

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »