Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
S D W H M E J B X B K S D Y T W A D D D H
E D Q P D B X Q R F T T S Y P P I S E F A
R X N C X B B P K C H A F H E D B C T I K
U B V J R B L R T U N F X T E A U E E S F
D O J R B T U E J Q P F Y A J W F Y C U J
E L G F Y W R V W N P R B S Y O C K T U Q
C X Q O S E J E J F F E M V Y D C Q I E L
O T T G K P K N S H N S M I D B L M O D R
R Q I U H W P T A F H P O W J N W T N T R
P D F E L S M I H V F O X A X B P L O V O
Y M D K U R P O H G H N K G G Q C J F M V
N N V L P N B N N M N S S O D J A B M X S
A K Q Y D G M O E C X I C S H H L H I J O
P W S I K M O F T C E B H E S S Y E S V Q
M T X N B L J M X V A I M T S E B M U P G
O N W O Y M A I U K D L L B A W I Y S X V
C O F H L J O S N N J I D B C R X N E T K
X E A F H E O U N I L T Y E T K J X V B N
O L N L Y P U S J O G Y V I L W F T O H B
G O L U Q V M E O J K D R J M V C I R P V
G F I R I P V H A W C K V A X B R D F T J

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »