Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
HideShow resource information
  • Created by: Callum
  • Created on: 14-05-13 09:54
S R E M P T C R T Y N K R M A C A O S N P
E A A O D D A Y O T W O O P I U E X O F T
R A N X X X E O D I Q V A S V C Y I W N S
U V V H O X H D H L U I T W I Y T O O V M
D N I E D W N C B I D C E O O N O I L Q H
E Q D J N M O M A B H D M E E R T N X J P
C B S A G R I F A I Y W T V H C O L K Y P
O E F K T H T N Q S G B E F E P D I N A F
R F O B O T A N G N X R M T N D E O O H P
P G O F G T G X W O P M E T I W Y E H W B
Y E D Y F T I V I P S D A A L O F M P Q B
N X R V T C T Y Q S U R B Q P G V L U M J
A P J G F M S F D E L N B V I J J D K C V
P N D H E M E Q X R J C H A C N T O G M Q
M I W G G K V F L F C J H Y S K B V H P L
O I R T A U N X G F U S T X I J A X I M R
C T D L J N I R W A C Q G H D J A H N I E
Y L B C I R H X Y T I P F D A J H H E H Y
R K Q F M A W U L S M G U L S C Q B N H C
M A F S R X S C K M I I Y I O N Y P W S N
U K B R L D E F G W V V K A V C I Y F S J

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »