Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
J J N G C S R R V S J B S Q Q O D N Y R M
O A Q V N S R D S R J R S O W B X S T T C
L M P B O B G I E M H F W Q B A O N I J H
X Y V O I U N S R M K S T V N O V R L I I
D N V L T B G C U X Q Y N R G G F S I D O
O V G J C K Q I D I L K K U W I Q Y B T J
G O A R E G A P E N Q N R G H I T E I D G
K N Q U T A T L C V N O C Y L A I Q S V S
H C F T E R R I O E Q I C E F E E O N A C
C B C O D I I N R S P T M T H X J L O W B
F F R N R D N E P T O N G Y Q K D B P U Q
O G Q E E X W D Y I K E Q Q A K O O S J D
W D U L R U S N N G D V L L M I V H E N L
E I S L X S Y H A A B E H W I F P F R V F
K P V N J C L Y P T S R A A L N C M F T Q
V Y U N X N B W M I R P S I N Y Y I F Y X
H Y J G I D M Y O O D R T M K G W S A P T
N T P S P O Q H C N X R E F F F K X T F Q
M Q G N O X T A K E T B A W K B Q H S A R
K H P D R O K C W G M L K J F A M D C Y N
P X P Q D I S X T B Y J A J Y S U W O P L

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »