Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
M V R T G I J W S N H I M L M R W Q E C G
D W A M P I W K I G H K S N U B R N S L C
Q O E R U T G K B N L N T O W A Y D U F P
V J B B I D J K T C U J A I X X E Y H J H
J Y H S E W V I X O D W F T N R A O J R Q
Q T J H N J U T N M S N F N M P T X I V U
D M Q N O D A P T P Q C R E F V Y R F M M
B M U Y I W D R D A M L E V U A F A Q B H
Q C G J T R D U G N V C S E L N D F V L A
M X Y D A E E V T Y Y H P R V G C P Q U S
O V P O G N K X K P O C O P M N R E K K P
D K C C I I U H E R X V N Q D C M T X N P
E J A T T L M F G O I F S C N P S X S N Y
T Y X S S P P Y S C I S I F P T B X P D N
E I Y J E I S L O E U B B Q V H N V S S N
C B U I V C Y T U D R B I D L X O S P H V
T M K X N S P C E U V R L U T B O N P P L
I I X F I I K I A R Y D I A J T W R D F A
O S Y L H D F L C E E R T C U A B F W Y D
N G P T F W O W J S G V Y E X Y X P J V K
W Q L M P D I Q R R Q B I O R F L V M H G

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »