Security Policy
Includes:
- Factors which need to be considered by an organisation when developing a security policy
- Created by: Callum
- Created on: 14-05-13 09:54
T | L | G | H | U | H | U | C | Q | A | A | L | I | R | G | U | V | H | X | J | E |
C | O | M | P | A | N | Y | P | R | O | C | E | D | U | R | E | S | I | O | A | B |
B | U | S | B | V | H | F | N | R | R | L | M | T | W | V | A | Q | H | I | V | D |
X | J | K | I | B | P | Y | D | I | S | C | I | P | L | I | N | E | E | V | T | L |
W | V | I | R | G | R | H | A | F | G | C | F | V | R | Q | I | O | J | M | V | P |
R | A | V | I | Y | G | X | N | T | O | C | F | H | V | T | M | A | X | H | C | E |
W | E | G | A | V | G | Q | L | D | G | K | E | J | I | L | U | T | S | U | Y | C |
L | N | G | O | D | E | T | E | C | T | I | O | N | W | F | C | K | O | S | C | G |
C | R | I | H | Q | F | I | T | S | E | I | W | A | A | I | O | W | G | X | H | A |
Q | V | I | N | J | F | W | Q | Y | W | E | J | V | A | W | K | B | Q | S | G | C |
O | V | C | X | S | Q | N | N | B | Y | B | Y | W | S | C | B | F | Q | S | T | F |
Y | K | O | M | J | P | A | U | A | Q | Y | T | P | Y | Y | T | Y | S | N | C | I |
E | B | I | H | E | R | J | V | M | U | U | G | K | C | N | M | U | B | R | V | U |
S | I | I | N | V | E | S | T | I | G | A | T | I | O | N | Y | Q | M | T | V | Y |
F | B | Q | J | C | C | Y | F | J | P | R | E | V | E | N | T | I | O | N | U | Y |
Q | S | T | A | F | F | R | E | S | P | O | N | S | I | B | I | L | I | T | Y | C |
X | D | G | I | W | M | U | L | R | U | Y | U | H | S | A | A | H | X | Y | C | P |
L | E | A | Y | B | E | V | Y | A | X | H | J | M | E | C | K | K | J | O | V | S |
T | K | F | H | N | D | W | O | E | M | Y | P | A | S | I | S | C | N | I | D | B |
G | B | X | H | F | T | R | N | G | H | X | W | A | B | N | J | D | G | R | K | H |
U | I | W | M | P | C | O | F | W | C | H | P | H | G | B | W | N | Q | I | O | Y |
Clues
- Awareness of employee potential (5, 14)
- Discovering the origin of the misuse (13)
- Finding out that misuse happened (9)
- Stopping accidental security breach & misuse (10)
- The final action taken towards culprit of breach (10)
- The process of action when misuse occurs (7, 10)
Comments
No comments have yet been made