Security Policy

Includes:

  • Factors which need to be considered by an organisation when developing a security policy
?
  • Created by: Callum
  • Created on: 14-05-13 09:54
Y C E I A Y N K F I P H G F F F S O Q C H
F S S P U K D C O U D U G M D L T L R J D
K S P P U R E N U U N X G T D C A K C P K
R V R A V E T M C T J G B T U S F V A B S
H W E C L N E G O Y V W S B O O F E V R O
B C V I I I C H M P K N P I O G R A P L X
E E E N U L T U P A H L K M B I E V Y Y X
T N N V O P I G A F W E T G Y U S M J C C
A F T E L I O F N H G S X Q A Q P O R G Q
Y M I S A C N W Y W A K U L B G O A K Q Y
S A O T I S V Y P G N O X G T Q N O M Q X
I X N I L I H G R N G M K R L M S Y F W T
S Q T G S D Y W O A Y J G O L R I U P P T
Q L A A R W X B C K D E J H S S B A P W S
K H W T C Q F O E D W Q R N T I I X Y T V
J S V I M X I V D C A C K X F G L F Y A M
O F K O I G T E U M D N W I A T I N J D F
G T V N J O S Y R D H F B N D S T M N T E
F I T D S I C J E Y R W R B W H Y P K M S
R S M X G Y L V S D E X N B H L D L T K Q
D X W K A V P D P Y X N K H H L O O N I K

Clues

  • Awareness of employee potential (5, 14)
  • Discovering the origin of the misuse (13)
  • Finding out that misuse happened (9)
  • Stopping accidental security breach & misuse (10)
  • The final action taken towards culprit of breach (10)
  • The process of action when misuse occurs (7, 10)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »