Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:52
F Q S B I M K Q V C Y X I L T E X L F S N
V S T A F F R E S P O N S I B I L I T Y B
D H V K D N A C N I H L D C R J L S S V S
F Q Y S C S M H L R A D E W F E V K K F B
Q I W I U D S L J U C T M D S N K P G I I
C F H S B I S R A G Y N Y V U F U L H C Y
V E L Q B L Y D Q E B X B R T V W V S T A
X D E T E C T I O N O F M I S U S E H I A
W K Y F L R S Q P E I X M O B D A J S A G
P A U A W L U C L E P U E Y E W N P L D T
G N T J J T K A Q D H P I M G C P D I S C
N T D M X H D J S O S L V H P S N T B E O
L M D L K E T U O L Y G Q A N P S B I F W
R V M S N E Q L H E C V P G M P E F I T R
N U X H C M V S J W Q U V N Q P V F K U K
C B P E Q K P R S Y E E K B O D J G X O L
P O V C O M P A N Y P R O C E D U R E S O
I M R Y M O Q M R Y R K M I G S Y A Y L T
P R E V E N T I O N O F M I S U S E P I T
Q Q I G X U R O T S B W X X M Y U D F O E
C B A N T U D M B S K P V Q N Q L F T O V

Clues

  • Awareness of employee potential (5, 14)
  • Finding out that misuse happened (9, 2, 6)
  • Stopping accidental security breach (10, 2, 6)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »