Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
I U R G H O O A R G N E U Q E K G X E D N
H W M Q M B E D E T E C T I O N P B B A I
S T A F F R E S P O N S I B I L I T Y L O
E G V O Q S H B K A A A M O D N T C O K W
E I N V E S T I G A T I O N U S O M H D Q
N B I B U E M O C U U P V J U I B T H V X
I S X C Q W P P J S F A B R B R F E N X C
L Q C O M P A N Y P R O C E D U R E S D V
P J N V Y G Y S H G L E J X G O N W O G V
I Q X D R E J U L A M W R J S B O S Y C F
C G R P I S T X Q R O Y F E D L I O F E W
S A K A F B M N M U O U F E H P T B Q N T
I M B M M K Q B S K H J F B R J N B S U X
D H I U Q N F S J F Y W X G S V E J D J C
Y F X V W U M H S T T B U X K X V L J J V
F Q C J B L J L G S V B X T W I E D X O A
F A S K L O P E J G Q L W G M M R R Q H X
N A T R Y A E C S E P Y E E O G P Y Q C X
C Q B S W Y D H E W N Y A Q R B O C H O K
N M H D C K Q P R J C R K F N E G U K F Q
N T B E D F N A D P V Q T C H J C N E W A

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »