Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
D S S H R H W L A R Y X F I O C F D T I P
N S M L K N K S U H T E V J Y J W T V D N
V G I X L Y H E I Q I Q D U U R K W D O A
X D N K D O Y R E P L U U C A D B F Y F J
X X E X U Y I U T G I R G R Y I P I E D M
E P F J Q M C D T T B D Y N L S R J E Q T
Y I E B J O T E O W I J R O D C E T V R N
H I C X D F P C A N S V V I P I V N Y B T
R N K B K G Q O A A N X H T H P E A E K C
Q V V B Y I I R K Y O R J C P L N N T O I
V E R N N O N P P C P I O E Q I T I A T X
M S Y G W E W Y T E S H I T E N I B K G A
O T P E F L F N A O E P R E E E O A E O N
V I E V N Q W A N P R R C D G C N K S L T
I G B K A T J P U J F L I Y V P U W W C K
L A R E R V M M Q X F L A I L T L T C P S
G T O L Y G X O V P A I W F R W T W V M Q
Y I N N C N F C S H T O G C O S S J X A L
V O J I Y H O V F G S M V P H X P U S M V
X N T T X D J B Y S Q W Y J Y J F O W V D
G P P P L K L I J Q O U I J M G U U I I W

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »