0% found this document useful (0 votes)
85 views

Ist M3

The document discusses internal and external threats that an organization named Berimbolo Security may face. Internal threats include deliberate actions like employee data theft or sabotage, as well as accidental actions that compromise data or systems. External threats come from cybercriminals seeking money or information. To mitigate these threats, Berimbolo Security should implement policies governing employee behavior and device usage, establish security protocols, and clearly define disciplinary consequences for violating rules.

Uploaded by

Naiyara Neeha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Ist M3

The document discusses internal and external threats that an organization named Berimbolo Security may face. Internal threats include deliberate actions like employee data theft or sabotage, as well as accidental actions that compromise data or systems. External threats come from cybercriminals seeking money or information. To mitigate these threats, Berimbolo Security should implement policies governing employee behavior and device usage, establish security protocols, and clearly define disciplinary consequences for violating rules.

Uploaded by

Naiyara Neeha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

M3. Analyze how threats, and mitigation of those threats, impact an organization and its stakeholders.

A risk to data privacy is basically the security threat. Berimbolo Security might face security threats as
well. Spam can cause security threats to the computer, since it is mostly used to spread viruses. Internal
threats that Berimbolo Security might face are given below:

Internal Threats: This rises from sources inside the channels of an organization, as for an
example, a disgruntled member of staff with rights of entree who wants to commit illegalities.
This comprises managers of the organization, workers, freelancers, interns, etc., as well as inner
infrastructure.

Deliberate: These threats refer to malicious attempts by an insider to access and possibly harm a
company's data, systems or IT setup. There are various sorts of deliberate threats, which are as follows;
 Employee actions: Disgruntled or recently dismissed staff may damage or delete files as a form
of revenge. They may also cause damage to the company software system or post damage
information about the company online.
 Data theft: Employees may steal data such as customer lists, which they can sell to
cybercriminals or competitors.
 Users overriding security controls: employees may want to bypass security controls as they find
them too restrictive and frustrating.

Accidental or Unintentional: An accidental insider threat is a recent or former member of staff,


outworker, or professional who has or has had permitted entree to the network, system of an
organization and who unintentionally causes damage or significantly upsurges the risk of potential
severe injury to the privacy, reliability, or obtainability of the association through action or inaction
without malicious purpose.

 Accidental loss; Employees often delete essential data or information unintentionally.


 Unintended disclosure or mutilation to data; Employees may inadvertently expose
confidential data, or may corrupt files.
 Unsafe performs;
i. Taking files from websites that are not trusted.
ii. Using file sharing via different software applications.
iii. Inserting exterior flash (USB).
iv. Bringing their own computers to recover data from businesses.
v. Go to see websites that are not trustworthy.

The external threats that Berimbolo Security might face is given below:

External threats: Individuals outside of a company who use the Cyberspace, other webs, or dial-
up connection in order to obtain illegal access to a company's networks. Threats from outside an
enterprise come from a number of sources,
 Cybercriminals asking for money
 To attack an individual or organization by creating pressure or by ransom after
obtaining their bank account particulars or credit card number
 Pressurized by political violence.
To keep the company safe and secure, Berimbolo Security needs to take precautions. The company
can make the employees sign to an agreement where the policies and rules to prevent the company
from any threats are will be written down and the consequences that one may face if they breach any
regulation. Berimbolo Security can also mention the amount of fine that one employee will have to
pay if the company faces any harm or threats because of them. The company can follow the bellow
rules;

 Personnel responsibility can involve securing office cabinets and drawers, closing or shutting
down unattended devices, carrying Identity card, and not disclosing any details or other basic
safety measures intended to prevent from social engineering threats.
 Employees should be aware of the disciplinary repercussions of intentionally violating the rules
of any IT usage policy.
 Guidance on how to carefully handle unknown email channels should be given by email
usage policies, including not opening attachment or following hyperlinks.
 Internet usage rules should contain how to avoid malware-infected websites and how to avoid
security breaches during file download.
 Security and password protocols can specify how credentials and authentication keys should be
safeguarded.
 Companies will have a set of standards outlining what workers on their own devices are and are
not permitted to perform while at work, as well as how their devices can be connected to the
company's systems.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy