Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
K N L K R Q O P Y Y W M X X X S M U S I N
F O L I B B C U A N D P S B H X I D E R F
S P T M A A P I M K K X T T P C J N R D U
H W I H D V X J R N S H A S Q E O J U C X
M L O P Y Y A G K C P T F G L I Q X D G P
E K W G P V L J L U D N F S T Q W Y E Q N
P R E V E N T I O N I O R C W E D Y C A U
O K O B R D T O A F E I E V K M Y E O R P
L E Q U J U O H A B A T S G N K V L R G P
I N G R Y C C L R X E A P K W N Y O P T T
F I S F K S T B F D Y G O F J G B U Y V J
G L A O F N V Y G C M I N A J I P R N X F
M P N G Y R C L J S A T S T I X T A A B X
Y I U W K X O U V E D S I F I R W J P B J
Y C X W P L U I M O O E B H S X J P M S H
X S U E U Q A B L B N V I W D R P H O J S
W I Q Q O W W B P L E N L E I A F Q C J R
M D Q K M M A B B H Q I I A C C S U B V M
H J C B A D L J T C X C T M W M W A D K S
A N J B B I Y D X D Q Q Y A Y M U X Q K S
T M U F U E R V M L T P P P N W Q Q M I L

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »