Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
X B S A J A K E E G S X M Y N J Q L G K V
T L T R W W A B N U I U J C W G N Y D U N
P S A P P H L Q S K D F A O A S M X T F U
N K F R M K A R W F P S O M D U K U B W O
V B F E P P B G C V D I S P E V G F B Y N
T S R V H J H I H C U Q D A T O X E U Q O
K W E E G G D Y I R E J N N E Y P W C M W
D H S N L D I R M V J W G Y C Y Q F J B E
S H P T P N O I F Y X E O P T R O H G L W
P S O I N J U H T S R C E R I K C T O B I
Y T N O I W U R P X G E H O O F F Q O V I
L Y S N T K R W S S T Q C C N U L G Y A L
F H I O F C I H E T I W G E O K A W M K H
B F B F L H N Y R C D Y V D F M L K B O V
K A I M C P C F H T Q E Y U M O A W P Y Q
E J L I T N H X S G J C J R I D U L L A O
C J I S Q B Q L A K G Q M E S T H V M G O
D D T U M S I F G I A A I S U P H O C F R
J Q Y S H M N L U A R E R W S M Q J S R U
R W D E C F B E K X T K Q E E A M P R M V
E K L K D G W O B N R L E Y W Q B D V Q E

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »