My Btec Information Technology Work 3
My Btec Information Technology Work 3
(P6)
Internal
An internal threat is the possibility that an individual working for a corporation might
take advantage of a vulnerability in a system to either steal data or do harm.
Consider a worker attempting to obtain illegal access to contributors' financial and
personal data.
establishing a digital trail to monitor which data files were viewed and to trace
the point of access where a system or asset was compromised.
These polices overall stop employees from making themselves vulnerable to such
attacks and bringing threats into the charity unknowingly. Research also indicates
that phishing is responsible for 80% of recorded incidents, making it the most
common cause of data breaches. Therefore, our main responsibility moving forward
should be to provide huggson charity with training which educate all staff members
about phishing.
Some employees, on the other hand, do not actively seek to participate in the internal
risk. They may be at risk due to various reasons, such as insufficient training on
safety protocols or how to ensure their own safety.
Additionally, some workers may unintentionally damage their devices by leaving them
unattended or spilling coffee, beverages, or other liquids on them. This can lead to
more interruptions or loss of data, making it inefficient for the organization to transfer
information across different IT platforms.
External
There are several types of external security risks that come from outside the walls of
the firm and are started by individuals who are not connected to the company.
Individuals may also be the target of external dangers.
Shouldering serves as an example of such risks. Shouldering refers to the act of
obtaining personal information by physically inspecting the device's screen and
keyboard.
This type of threat can be seen from unfamiliar individuals. Similarly, shouldering for
example can occur when an employee is buying cleaning supplies or other items for
the charity from a store and they pay by entering the credit card pin or charity
financial details this means they must be careful when handling sensitive data in
public as they can be open to shouldering.
However below are some precautions and policies that we will encourage within
huggson charity to implement in order to maximise best security:
Turn on a MAC address sequentially. Every network device has a unique MAC address,
which helps network administrators monitor and control devices on the network and
keeps unauthorized devices out of the network.
When transferring data and communicating online, especially when gaining remote
access to an organization's network, use virtual private networks, or VPNs.
Seek advice and collaboration with cybersecurity experts or consulting firms about any
outsider threats to be wary of.
Ensure to consult cybersecurity specialists or consulting organizations for guidance and
assistance regarding potential outside dangers.
[P6]
Describe procedures to be implemented in an organisation to allow them
to protect data and information. (P7)
Phishing attacks and how they can be prevented:
Phishing attacks are one of the most common kind of cyberattacks that happen all
around the world, and they may affect even nonprofit organizations.
Phishing entails sending or transferring money through fraudulent requests. In
order to combat this, our team will train staff members on how to perform in-
depth background checks on dubious websites. This will entail asking other
employees and staff members to confirm whether the charity is in debt or has
not received payment.
Make sure staff members carefully review any unusual file attachments to
ascertain if they were asked for or expected; otherwise, there may be a risk of
viruses or other malicious software being introduced, endangering the
protection of personal and charitable data.
Train staff members on how to recognize phishing attempts based on spelling
and grammar. Reputable, well-established organizations usually use formal,
business language since they have the power and knowledge to correct typos
and ensure writing correctness.
To make sure they understand the repercussions of their conduct and are not
tricked by phony websites, employees will get in-depth instruction on rules and
regulations. Threat identification strategies will be covered in this training.
Provide supervision, direction and training in activities which require the Internet.
Employees and stakeholders must use extreme caution when opening e-mail
attachments received from unknown senders which may contain malware.
Revealing your account password to others or allowing use of your account by
others. This includes family and other household members when work is being
done at home.
[p7]
Describe procedures to be implemented in an organisation to allow them to operate
in legal, moral, and ethical ways. (P8)
There are several methods in which the charity might promote the use of operating
lawfully.
Since they shield a variety of data—including donor bank account information—from
abuse or public publication, privacy regulations constitute a significant body of law.
Our staff will adhere to this regulation, and we guarantee the protection of donor
financial information by utilizing security methods like biometrics and authentication.
In accordance with applicable regulations, we will also contribute to securing the
licenses and permissions needed for rescue, shelter, or adoption activities and
ensuring that they are up to date and not expired. The charity should consider
routinely consulting with legal experts to stay abreast of regulatory developments and
to immediately manage any legal concerns.
Stated below are our overall legal policies and we expect compliance from
all employees and other stakeholders:
No attempting to access confidential information (Unauthorized access)
New software should be consulted with professionals before being downloaded.
Comply to laws protecting consumers from unfair or deceptive practices.
Stakeholders must comply with our health and safety regulations as failure to do so
may result in harm and financial penalties.
Information remains confidential such as financial information and other donor records,
failure to do so will result in fines and penalties.
No fraudulent offers of products, items, or services must be permitted by the charity.
All computing devices must be secured with a password-protected screensaver with the
automatic activation feature set to 30 minutes or less. You must lock the screen or log
off when the device is unattended.
Accessing illegal websites or online illegal activity is unacceptable and illegal.
The nonprofit will teach and educate staff members and other interested parties on
legal compliance. Because they raise employee awareness and provide instruction,
these training sessions may ensure compliance with legal processes by making
employees aware of the serious repercussions of engaging in illicit action inside the
company.
Finally, inform higher authorities or organizations about the breach and take
appropriate action, such as terminating or dismissing any employees or
stakeholders implicated in the breach.
Stated below are our overall moral and ethical policies and we
expect compliance from all employees and other stakeholders:
All activities and events that kodeys charity undertakes in does not cause
environmental damage.
All of the charity’s products are eco-friendly and do not harm the environment.
Conflict of interest policy – employees must not let self-interests harm or collide with
professional interests, duties, or responsibilities.
Ensure transparency and fairness in relationships with other charity members and
stakeholders.
Employees and stakeholders must be completely honest, diverse and show integrity.
All stakeholders have the responsibility to promptly report the theft, loss or
unauthorized disclosure.
No form of harassment is permitted, this includes on online platforms and face to face.
Whistle-blower protection (We ensure a safe environment is provided for employees
who report unethical behaviour)
We expect loyalty – Workers must speak positively about the charity in public and only
address personnel or corporate issues in private.
Different approaches will also be employed to address legal and ethical issues,
depending on their specific nature. The necessary actions to rectify such issues will
vary accordingly. This includes providing additional or advanced training, offering
apologies to clients, family members, or caregivers, and implementing other
disciplinary measures. [p8]
CybSafe (2023). Train smart, not hard! The intelligent approach to phishing training.
[online] CybSafe. Available at: https://www.cybsafe.com/blog/phishing-training-an-
intelligent-approach/#:~:text=Phishing%20attacks%20are%20the%20most.
www.knowledgehut.com. (n.d.). What is Shoulder Surfing & How to Prevent It? [online]
Available at: https://www.knowledgehut.com/blog/security/shoulder-surfing
www.indeed.com. (n.d.). Ethics Policies for Your Business: Do’s and Don’ts. [online]
Available at: https://www.indeed.com/hire/c/info/ethics-policies-for-your-business?
hl=en&co=US
www.indeed.com. (n.d.). 21 Core Company Values to Consider for Your Business (With
Examples). [online] Available at: https://www.indeed.com/hire/c/info/company-values
Indeed Editorial Team (2023). Business Ethics: Types and Examples. [online] Indeed
Career Guide. Available at: https://www.indeed.com/career-advice/career-
development/business-ethics
Indeed Editorial Team (2023). Business Ethics: Types and Examples. [online] Indeed
Career Guide. Available at: https://www.indeed.com/career-advice/career-
development/business-ethics
Volkov, M. (2021). Why Ethics and Compliance is Everyone’s Responsibility. [online] GAN
Integrity. Available at: https://www.ganintegrity.com/blog/why-ethics-and-compliance-
is-everyones-responsibility/.
antelakis, A. (2023). Acceptable use policy template. [online] Recruiting Resources: How
P
to Recruit and Hire Better. Available at: https://resources.workable.com/acceptable-use-
policy-template
Chin, K. (2023). How To Detect and Prevent Insider Threats | UpGuard. [online]
www.upguard.com. Available at: https://www.upguard.com/blog/how-to-detect-and-
prevent-insider-threats.