Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
O C S A E A X V N Y V R E W V C H E V M A
X Q B F Q A A U I Q C R O S A I B D I Q B
I E C S C Q P F M P H C E B O W G Y R P T
C U X W G I G R P U S V Y I D C Y R E Y L
I P E Q Q R J S X U C B P A V E R S L H I
I M E Y P V K T I L D I B E G S N L I J Q
E E A D I N V E S T I G A T I O N H P T W
Y J H R B J W Y X Q C Y L R G I O P L C I
R E U N A D E T E C T I O N A H F R M X L
E O O K U U V J A A D I S C I P L I N E Y
S T A F F R E S P O N S I B I L I T Y P N
W I G D I Q D E F Y S X F X U W M P D Y P
P V S O M R P R E V E N T I O N B R V A Q
M J C C O M P A N Y P R O C E D U R E S C
L F J A O A F L X F R W V I O W L H B F O
F O X A V I A I Q A W P A G O F L G T F Y
U P U R X B G U M H C B A U I W F O Y S N
O G B L K B Y E T X F Q O I E S A X P C Y
E U V W X X V P T V H D E T P F B H M K G
F D R Y Q I S R M P J W F O N M A T F K T
M N M U T U I W S U J G P Q P Q C W S I E

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »