Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
?
  • Created by: Callum
  • Created on: 14-05-13 09:54
Y J M N R L S O K M T P E B Y P E Y D C P
R X I D S C T L B G W E J G K A J Q Y H B
B A H T E C A X J N S U T J F J A C L I U
P A V C R X F N J J M N U Q Q B N E H H H
T T X C U B F K T Q N G H S X C O C F S Y
F K S E D U R O D O O P K V O K I S F F H
M O I K E A E W X B I D B Q W J T V Q I P
V K X Y C U S N P J T V X C F O N D Q S N
O F S P O C P R E G A E I L R E E L P H A
N Q D T R U O R W L G U N V X D V S I D A
P Q I D P J N E J K I E Y U K B E Y K Y I
G R S E Y A S W M X T G W T H U R W X U X
Q U C T N Y I S K N S N K X H M P N D J W
A S I E A R B F R B E P L F Q T N Q N P G
D G P C P U I Q A W V G U P T H R J J T D
Q W L T M N L T N B N K V B J D W Y C X U
N B I I O X I T E O I C L L D P P T C P J
T N N O C J T B X K W I M X B K T U R B I
F T E N C B Y G F D Q F A G V H A I Q D U
X V O V R T Q Q K E W U F G P Q A J I I O
I H A V Y B V M A C N R H Q B U I K F M W

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »