Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
K H J J N C P Y W U G W Y W D N U X F O L
V J Q M D P U Q R A F R I A Q O R F N E T
C O M P A N Y P R O C E D U R E S U T J A
O V N M W O M C G Y K J E V S H A I J M P
H D P U I N V E S T I G A T I O N Y F Q Q
A E C N K Q L T S T P V H I L R L K T Y Q
Y T K V I D Q X J U P N O E B G E Y S Q I
I E P R E V E N T I O N Y P A N X E L U M
B C W E D B M M B Q J O W A I W M L L E T
Y T U E N N J F A F K T Y L C B X D E I P
I I U J O K N M N T R R P B D L L Q M K W
W O K V W J B B P Y J I K B I Y U I Q V T
W N N U T K H R X W C A S T I C A F I H Q
Q A Y F V Y Y N S S R E S G B A L M D T Y
G X A S J G A V I G H T Y O P L B Q A L M
J S W D T U F D W J S L W F P D B F V X U
Y P U P S Q F O L U F G G I S N L X L Q N
S T A F F R E S P O N S I B I L I T Y Y W
J H V R S O S Y T I Y V T F E B H D Y T T
J T I F I N W O J C H D I C P K F G N N R
Q M J C S F Y F L H O R R Y L A H R Q K I

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »