Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
D T B C S N M Q Y K U U W T P E I C T J Q
S V C O M P A N Y P R O C E D U R E S K A
T D Y M D D I S C I P L I N E F D Y W U A
A N L C P R E V E N T I O N E Q N X K I J
F N K V V I L W X N E I W Y H H X L O G C
F E C S B X M U J Y H P B A W F E C W M S
R Y G R Y R N G P X H D X X K J B F D A D
E C Q P O A V Q W D E T E C T I O N S B M
S P I N V E S T I G A T I O N V F K G V T
P F T C P G P T P P F A S J Y H S J C A O
O V G T M H L S W F I A T H Q X V E Y U Q
N I I L B G W N B L Y P I Q R G C V R T L
S N B A S S S B J Q W B B H G S X W S P T
I H J O S W R A B O O F D O N M P O E P Q
B C G Y O U N C G P G G Y V M A X E H T Y
I O O U Q U E I C O Y S I M J R N W D Q A
L L V G E G I Q H F A O P L O G L B C D S
I M U C R N F W L B Q S A E I K D M W I U
T A Q C F M X H O L K F K X J T F W C T J
Y P G W F H Y I G A D X P Q H K S V E A H
Y T Q R Y V R U W C G L P K S S E A Y N M

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »