Security Policy
Includes:
- Factors which need to be considered by an organisation when developing a security policy
- Created by: Callum
- Created on: 14-05-13 09:54
Y | C | E | I | A | Y | N | K | F | I | P | H | G | F | F | F | S | O | Q | C | H |
F | S | S | P | U | K | D | C | O | U | D | U | G | M | D | L | T | L | R | J | D |
K | S | P | P | U | R | E | N | U | U | N | X | G | T | D | C | A | K | C | P | K |
R | V | R | A | V | E | T | M | C | T | J | G | B | T | U | S | F | V | A | B | S |
H | W | E | C | L | N | E | G | O | Y | V | W | S | B | O | O | F | E | V | R | O |
B | C | V | I | I | I | C | H | M | P | K | N | P | I | O | G | R | A | P | L | X |
E | E | E | N | U | L | T | U | P | A | H | L | K | M | B | I | E | V | Y | Y | X |
T | N | N | V | O | P | I | G | A | F | W | E | T | G | Y | U | S | M | J | C | C |
A | F | T | E | L | I | O | F | N | H | G | S | X | Q | A | Q | P | O | R | G | Q |
Y | M | I | S | A | C | N | W | Y | W | A | K | U | L | B | G | O | A | K | Q | Y |
S | A | O | T | I | S | V | Y | P | G | N | O | X | G | T | Q | N | O | M | Q | X |
I | X | N | I | L | I | H | G | R | N | G | M | K | R | L | M | S | Y | F | W | T |
S | Q | T | G | S | D | Y | W | O | A | Y | J | G | O | L | R | I | U | P | P | T |
Q | L | A | A | R | W | X | B | C | K | D | E | J | H | S | S | B | A | P | W | S |
K | H | W | T | C | Q | F | O | E | D | W | Q | R | N | T | I | I | X | Y | T | V |
J | S | V | I | M | X | I | V | D | C | A | C | K | X | F | G | L | F | Y | A | M |
O | F | K | O | I | G | T | E | U | M | D | N | W | I | A | T | I | N | J | D | F |
G | T | V | N | J | O | S | Y | R | D | H | F | B | N | D | S | T | M | N | T | E |
F | I | T | D | S | I | C | J | E | Y | R | W | R | B | W | H | Y | P | K | M | S |
R | S | M | X | G | Y | L | V | S | D | E | X | N | B | H | L | D | L | T | K | Q |
D | X | W | K | A | V | P | D | P | Y | X | N | K | H | H | L | O | O | N | I | K |
Clues
- Awareness of employee potential (5, 14)
- Discovering the origin of the misuse (13)
- Finding out that misuse happened (9)
- Stopping accidental security breach & misuse (10)
- The final action taken towards culprit of breach (10)
- The process of action when misuse occurs (7, 10)
Comments
No comments have yet been made