Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
?
  • Created by: Callum
  • Created on: 14-05-13 09:54
T L G H U H U C Q A A L I R G U V H X J E
C O M P A N Y P R O C E D U R E S I O A B
B U S B V H F N R R L M T W V A Q H I V D
X J K I B P Y D I S C I P L I N E E V T L
W V I R G R H A F G C F V R Q I O J M V P
R A V I Y G X N T O C F H V T M A X H C E
W E G A V G Q L D G K E J I L U T S U Y C
L N G O D E T E C T I O N W F C K O S C G
C R I H Q F I T S E I W A A I O W G X H A
Q V I N J F W Q Y W E J V A W K B Q S G C
O V C X S Q N N B Y B Y W S C B F Q S T F
Y K O M J P A U A Q Y T P Y Y T Y S N C I
E B I H E R J V M U U G K C N M U B R V U
S I I N V E S T I G A T I O N Y Q M T V Y
F B Q J C C Y F J P R E V E N T I O N U Y
Q S T A F F R E S P O N S I B I L I T Y C
X D G I W M U L R U Y U H S A A H X Y C P
L E A Y B E V Y A X H J M E C K K J O V S
T K F H N D W O E M Y P A S I S C N I D B
G B X H F T R N G H X W A B N J D G R K H
U I W M P C O F W C H P H G B W N Q I O Y

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »