Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
F P U Y R E A J T E U W Y I J B N A S U O
H T T T Q S J T K S A A S E X S O O U E M
B X L I O U M N E U R Y E G G O J E S H D
G A J L W S H X R S X D R N W H P X Y G O
P H A I M I Q W J I I V U G Y I C D X B O
O O O B Q M J M C M W Y D I Y C D P W A E
T P P I U F Y X Q F M J E I U W R Y Y S N
V L A S U O F A C O Q I C U T X R T E K D
J E E N J N U T P N D S O Y W T U O T X E
V B K O A O L H L O C W R J F I Y Y H F V
B M P P R I D Q W I U J P U K E E T S N C
X R T S L T P F T T O O Y Y Q Y C P V A A
Y J G E W N K S N C E K N T K L H T T L P
E Y B R I E D B U E X Q A R K T G N A G B
G M F F P V O U K T R D P N Q R R C K W D
X E N F F E P B O E U D M D P Q A Y U Q O
N X R A U R Q M N D E H O C G C I T T P P
J S D T V P O E K Q V A C X L B J V J V F
I N E S Y F D K D C P Q R Y G E S X W M T
N Y Q L O R U T W X H U D E B R D T A N H
S O Y F L X Y L S V O K O D I V Y W V T E

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »