Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
C X D X F J O A M X R W G P K K M J K T O
O C L C O L V K M Y M U V W I K G F A C Q
M V M N O Y Y T I R F F O O B H U U C X H
P P R D P J E C Y M F G X O T V F I U C N
A T N K T G L E W B W X Q S S L R W I T Q
N E Q N N M F C S B S N R A P E S U R M P
Y G M F C M M U N U F Q V H X Q L F O G V
P M W E B U N I H A U Y E C J B U F I S V
R C P R E V E N T I O N O F M I S U S E G
O P V W E R X T X D C L A Y I W S G H N K
C O Y D F Y J T H G M D L L A Q I S F A Y
E R Q N Y R Y P O J J W D M W N R N I H K
D M F N S J H C C F T B D N P I I W V I U
U F P I T W H S X K N B O F H C F N D N D
R T Y H S P C A K Q I C C D C T I C K A G
E H C D T E D F P R D N E E T J F W R D A
S S T A F F R E S P O N S I B I L I T Y R
T V M S H V B M T J O L W O K J Q V N N T
G D P D E T E C T I O N O F M I S U S E D
K F E O C V H O C W K G K M X Q Y L Y E I
J E D J U O W O P L M Q B V K R F K C D U

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »