Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
G A A S J J Q Y J V S W L X D R E N P P E
T P X R H I H I N P E J D G I G P O C O I
U L I H A I D H D D R J T V S U W I G Q J
F X Y G U N R Q G Q U F M D C C U T D H A
G Y I B E V B E K C D X I A I M N C M H V
O M H C K E B Q O W E N D Q P P P E M D J
I O J O I S E B F A C H J B L V R T W W B
G F Y D Y T F A W W O S E N I I E E O D N
R T E W V I I V B C R U T U N Q V D V V J
N R E B N G U H D R P M F L E E E L J N J
S T Q C C A F P H Q Y L E K U N N W M K N
L M I R C T P X N U N C L O D R T W Y S U
V J P D C I A L X S A X G P Y P I B B X A
A P G O E O J M K Q P C U X D N O P O I B
X K M A U N E P X C M W H F J W N G N G V
Y W U K K R J H Q E O M J H E H C Q B S L
B O E D L W H C N L C N P B W P T K W B N
X A E N E S Q J P J V H Y E E G G F M L F
Y S T A F F R E S P O N S I B I L I T Y E
Y S C T N F X J B E L J Q X F N E L M S D
A R A H S C M H W I E B F V P M B F W A H

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »