Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
L C J U O A J R T I H U C G T Q M R D C S
C M T E Y Q F P T P W T V F Q V M V L M A
P R M G N Y I E A X M N A R Y L K Q X N J
E A X X Q G T M E D I S C I P L I N E K X
G P R E V E N T I O N G D J U T X U W H I
Q I B J H A P D A G D U U T D J E Q I T X
H D E T E C T I O N D Y A R F K I B M Y A
O G P W M R K D I B W J M C K D L U X C J
O D K N T S G Q W S I O M V I Y W A M R I
D T C O M P A N Y P R O C E D U R E S T H
O M S V O O H P N N L F O C U J T X F V C
A S E Q A Q X J U E A P Q O A T D T S V U
W I I S A N P O R U C W M X V P U U M I J
O I A R E K D L T V C O Y O B D F T O M J
K U P C Y N Y B M V E X K S T O E J B P F
S T A F F R E S P O N S I B I L I T Y X V
I N V E S T I G A T I O N P U W Y N G L V
T L G D A Y Y U F K G J M R B D T M H W S
S W Y U M S W D X I M K B C L R S F U K U
N H C E J C D W G C Q K O Y Y A S U B K H
L R P Y K O F I A V U W N W X H S E D D U

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »