Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
Q N X U L R V G B R T B L K V N F X L Y N
A F M C L P G R V X W U H Y Q L S K T J N
X J I V O X C M U H N F M R L E H I Y I K
F L O S R P G L E O H D P I R P L B P H O
R F I W K I C H I C J V T U G I E S T U T
M N B H D B G T S N F O D L B Y N M A K Q
P I S K P T C T O N E E F I Y N W Q G O O
F Q O U M E D I M N C R S D O D A H I Y M
X K P E T O T C I O L N F I I C D I Q L J
W C A E P N S L R X O M T W N U S Q N O B
R F D S E I P P T P O A J L J L V W Q L U
M D P V Q I Y A S G G F Y D P U V H K W T
W W E L C N S E U I P E G D O L R L B N I
N R U S A D R R T O W I Y J E S F O G Y V
P K I P G F R S H Q J T V U C E K X S E E
V D M O F R E I E T M J F D D L F V Y Y N
A O F A C V P P F H T S C G F Y F P J L D
C V T P N W M W L V D N N M T G F M G R E
P S F I N V B W T Y I C I Y H S I E P R I
U H S Y R J O R I M T Q W V V J Q I F F E
P P D N T F A L O B G S L E P Q E X W K F

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »