Security Policy
Includes:
- Factors which need to be considered by an organisation when developing a security policy
- Created by: Callum
- Created on: 14-05-13 09:52
G | U | R | N | E | M | P | A | U | T | N | M | G | U | B | I | E | Y | D | X | M |
I | X | P | Q | S | S | R | H | E | D | U | B | O | T | P | C | S | T | P | I | D |
B | L | H | D | E | W | E | C | F | P | T | B | X | R | C | I | U | I | P | C | W |
S | M | K | O | R | G | V | P | T | M | T | F | P | Q | A | B | S | L | T | N | V |
B | X | J | F | U | D | E | D | I | F | X | P | I | K | J | U | I | I | V | E | B |
C | F | T | P | D | S | N | X | W | X | N | K | O | Y | D | R | M | B | L | R | H |
O | U | V | O | E | Q | T | R | P | J | A | X | H | T | J | J | F | I | O | J | G |
S | D | S | R | C | P | I | D | W | T | R | U | F | M | Y | D | O | S | W | P | R |
M | O | O | R | O | P | O | T | A | B | M | P | H | O | T | N | N | N | F | B | C |
H | T | F | H | R | B | N | I | Q | E | L | V | O | B | J | V | O | O | V | S | F |
O | R | E | B | P | T | O | B | P | J | W | P | V | V | W | Y | I | P | R | K | X |
F | J | A | D | Y | I | F | D | R | Y | H | F | C | Q | U | Q | T | S | A | T | A |
I | O | L | M | N | A | M | S | S | U | T | G | X | I | J | J | C | E | Y | Q | F |
X | X | Q | D | A | I | I | X | P | I | O | E | L | B | P | F | E | R | N | C | P |
K | R | U | J | P | P | S | T | J | G | G | S | D | R | J | V | T | F | B | I | V |
K | E | L | Q | M | K | U | B | X | P | P | T | E | V | P | Y | E | F | G | T | U |
I | K | H | A | O | B | S | F | X | V | T | G | D | P | W | L | D | A | F | E | V |
A | D | Y | F | C | E | E | N | G | T | O | O | Q | U | C | N | X | T | I | Y | T |
U | G | F | P | G | U | Y | I | F | H | B | B | S | A | G | B | R | S | F | K | F |
A | T | O | Q | A | L | N | B | H | S | S | W | C | E | G | W | A | K | N | N | O |
R | K | G | O | W | B | O | G | R | V | K | T | W | K | G | Y | V | P | N | K | R |
Clues
- Awareness of employee potential (5, 14)
- Finding out that misuse happened (9, 2, 6)
- Stopping accidental security breach (10, 2, 6)
- The process of action when misuse occurs (7, 10)
Comments
No comments have yet been made