Security Policy
Includes:
- Factors which need to be considered by an organisation when developing a security policy
- Created by: Callum
- Created on: 14-05-13 09:54
Y | J | M | N | R | L | S | O | K | M | T | P | E | B | Y | P | E | Y | D | C | P |
R | X | I | D | S | C | T | L | B | G | W | E | J | G | K | A | J | Q | Y | H | B |
B | A | H | T | E | C | A | X | J | N | S | U | T | J | F | J | A | C | L | I | U |
P | A | V | C | R | X | F | N | J | J | M | N | U | Q | Q | B | N | E | H | H | H |
T | T | X | C | U | B | F | K | T | Q | N | G | H | S | X | C | O | C | F | S | Y |
F | K | S | E | D | U | R | O | D | O | O | P | K | V | O | K | I | S | F | F | H |
M | O | I | K | E | A | E | W | X | B | I | D | B | Q | W | J | T | V | Q | I | P |
V | K | X | Y | C | U | S | N | P | J | T | V | X | C | F | O | N | D | Q | S | N |
O | F | S | P | O | C | P | R | E | G | A | E | I | L | R | E | E | L | P | H | A |
N | Q | D | T | R | U | O | R | W | L | G | U | N | V | X | D | V | S | I | D | A |
P | Q | I | D | P | J | N | E | J | K | I | E | Y | U | K | B | E | Y | K | Y | I |
G | R | S | E | Y | A | S | W | M | X | T | G | W | T | H | U | R | W | X | U | X |
Q | U | C | T | N | Y | I | S | K | N | S | N | K | X | H | M | P | N | D | J | W |
A | S | I | E | A | R | B | F | R | B | E | P | L | F | Q | T | N | Q | N | P | G |
D | G | P | C | P | U | I | Q | A | W | V | G | U | P | T | H | R | J | J | T | D |
Q | W | L | T | M | N | L | T | N | B | N | K | V | B | J | D | W | Y | C | X | U |
N | B | I | I | O | X | I | T | E | O | I | C | L | L | D | P | P | T | C | P | J |
T | N | N | O | C | J | T | B | X | K | W | I | M | X | B | K | T | U | R | B | I |
F | T | E | N | C | B | Y | G | F | D | Q | F | A | G | V | H | A | I | Q | D | U |
X | V | O | V | R | T | Q | Q | K | E | W | U | F | G | P | Q | A | J | I | I | O |
I | H | A | V | Y | B | V | M | A | C | N | R | H | Q | B | U | I | K | F | M | W |
Clues
- Awareness of employee potential (5, 14)
- Discovering the origin of the misuse (13)
- Finding out that misuse happened (9)
- Stopping accidental security breach & misuse (10)
- The final action taken towards culprit of breach (10)
- The process of action when misuse occurs (7, 10)
Comments
No comments have yet been made