Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
P Q G J M O N N Q U O Q G N G O F W I E C
E E I M V N H T X D O O G L E N F P M R J
C R D Q G W O F X P K D E C T L P N W N H
R N Y J K H Y N V L J H T P U D E W P R I
Q I L N J D E A G B O X V E E I S K X D I
Y T U Y S S Y J N F C L G B Y U S I T H Y
Q G P L W B D E Y C G K V O O R P O R Q R
B U Q B H Y R T A M P U K N F B A B I C W
H C O M P A N Y P R O C E D U R E S X R I
F F U X U J V E W T V Q Y G F M U S B U L
S T A F F R E S P O N S I B I L I T Y G S
M U A Y V C X L C C N Q S W T W G E D O T
Q Y L F M M S P T S U V X V B I Y S E C X
C M P R E V E N T I O N O F M I S U S E K
I Q X D E T E C T I O N O F M I S U S E S
H Y X J T X V K Q D C M O O P J E D F L S
R G I T W J M G X U C C V G W V S F U M W
D I L P H X J I S G K N O B N N T V Q G O
Q G K T U C P W J E T G S X O W F Q W D J
B S M P C B G R D P X P M A L G A N M E M
R L X L I T U L B K I F J Q L Y P D V J I

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »