Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Executive Summary Future plus is the Australian charitable organization. They started the current educational project for backward economic student. They provide education with a free of cost. Many Australian people contribute some donations to this organization. The Sydney based organization try to secure their donor privacy data. So for a reason, if they should implement modern structures of database and also recruit some professional technician, then they create an extraordinary impact on Australian society.Their network structure is also very much enhancing because they use the fifth-generation network. In this organization recruit, two types of employee one are full time another is part-time. Full-time employee operates and manages all official matters with the help of a part-time employee .This company is enhancing day by day, and that is the reason they store a massive number of data and necessary information of their clients.In this paper, the writer discusses how future plus creates a good security structure for their contributor. Data storage policy and privacy strategy are very much crucial for the future plus to maintain social respect.
2 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Table of Contents Introduction......................................................................................................................................3 Discussion:-.....................................................................................................................................3 The basic idea of Donor Privacy policy:-....................................................................................3 To prevent the Dangerous problem:-...........................................................................................4 Future Plus Donor Safety Guidelines:-........................................................................................4 Contributor data safety technique:-.............................................................................................5 Recognize the confidential value:-..........................................................................................5 Use updated Software:-............................................................................................................6 Use protected connection:-......................................................................................................6 Create an Encrypted Database for Data storage:-....................................................................6 Strong Password:-....................................................................................................................7 Experience employee:-............................................................................................................7 24*7 monitoring:-....................................................................................................................8 Proper working maintenance:-.................................................................................................8 Unique privacy facility for contributor:-.....................................................................................9 Conclusion:-...................................................................................................................................10 References:-...................................................................................................................................11
3 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Introduction:- Future plus is the recently inaugurated Australian charity association. The work purpose of this organization is mainly helping Australian students. The backward economic student who are meritorious this company try to develops their future and provide them with an education. This organization started some modern technique for giving the knowledge of these students like the tutorial, early intervention (Hess 2015). Many famous public figures and familiar Australian people donate some money for this charity. This organization organized some charitable events which are directly telecasted by Australian national media. This organization also run special fund-collecting events, and it telecast on social media, television and websites. The head office of this organization in Sydney. Their network structure is also very much enhancing because they use the fifth-generation network. In this organization recruit, two types of employee one are full time another is part-time. Full-time employee operates and manages all official matters with the help of a part-time employee (Bredenoord 2015). This company is enhancing day by day, and that is the reason they store a massive number of data and necessary information of their clients. If the internet is not secure, then this organization faced a big problem. So the main target of this project is to implement a new service design, which is ethical and reliable. Discussion:- The basic idea of Donor Privacy policy:- AFP mentions the acceptance of a confidentiality strategy for any association that collects individualdata,includingnames,statements,addressesandcreditcardinformationfrom contributors at superior proceedings. It is an official, inscribed declaration explanation of how
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS organization use and shield contributor’s private information. This strategy determines to provoke faithand highlight that the association willnotshare or sell private information without authorization (Costa-Cabral and Lynsky 2017).Having a donor confidentiality strategy can permit the non-profitto connect to their donorsthe rank that they place on defensive their contributor’s information.Some Watchdog agencies and evaluations collections check whether administrations have a contributor privacy plan.For example, Charity Guidetakes this influence into accountfor its answerability and transparency tally. To prevent the Dangerous problem:- It is crucial to avoid the related issues of this charitable organization. When employees can prevent and resolve these issues, then they create some strategy for organizational enhancement (Sargeant and Jay 2014).The standard data storage places of the future plus are shaving cabinets, servers, and cloud storage. However, if that document is accepted positions, it shouldn't, an organization can get into problem.Future plus showing industry offline and online, here are certain hazard zones: Gathering credit card information and online dispensation payments. Future plus are Storing individual evidence on smartphones or laptops. Allowing admission to individual material to third parties without proper protections Storing private content on cloud servers or structures, or unsafe sites Future Plus Donor Safety Guidelines:- Future Plus delivers a privacy strategy on its website or by a demand that designates how contributor evidence is composed and used. It permits contributors to choose to make their private evidence accessible or shared (Watts and Casanovas 2018). Future Plus has a board-
5 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS approveddiscontinuecontactstrategyassuringthatcontributorscanbeuninvolvedfrom solicitation and other dispatching lists. The only individual data that future plus accumulate from contributors is the evidence that happily delivers the future plus organisation.If contributors choose to contribute by clicking the donate button on a future plus website, or if a donor contributes to Future plus via social media or other online sites. Future plus will collect correct individually recognizable data, which may contain donor’s name, postal address, email address, contact information and payment information. Concerningtreatingcontributordonationswhetheror notadministeredthrough theother payment processor (Novikov 2015). The payment evidence contributor delivers to future plus will only be used to procedure the client's payment.If a donor chooses to make a periodic contribution, then compulsory payment evidence will be kept to simplify upcoming payments. Otherwise, a donor's payment evidence will not be saved or used for any other drive. Future plus do not trade, share, charge, or else make accessible the names. The individual data of future plus donors with any other association or person.Importantly future plus do not send mails to the company's contributors on behalf of different administrations. Future plus only sending emails to the clients for payment confirmations and other official purposes. Contributor data safety technique:- Recognize the confidential value:- When it originates to information safety and privacy, keep in attention that different conditions and contributor bases call for different methods. Some contributors proclaim their charities openly while others select anonymity (DSS 2016). Knowing the privacy level that every donor imagines is just one step toward constriction up documents safety.
6 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Use updated Software:- Softwareupdatesareessentialportionsof therightsafetyapproach.Updatesare particularly significant if a future plus website is assembled on some popular platforms. Future plus is the public donor depended on organization, so this organisation is a viral target for hackers (Bandara 2014). If the software does not upgrade, then the hacker easily hacked future plus’s database and website. After that, they also collect the donor bank details and personal details. So the website specialists upgrade their web structure, software and data source then the hacker does not create any vulnerabilities. For this reason, the donor feels secure and also try to donate more amount for children education. Use protected connection:- Future plus is the company they used modern fifth-generation technology. But assure future plus office network is encrypted and protected. It is crucial that future plus cannot use public networks to access economic resources. If future plus technician are not assuring where to start, an encoded VPN is one ofthe most significant safe waysto access future plus network (Van Zoonen 2016). A VPN is a cloud-based network that permits future plus employees to access a protected connection no matter where they are. It supports confirm that data sent to and from the future plus servers are harmless from hacker's eyes . It is also a significant efficiency improvement.Futureplusemployeescansteadilycontactbusinesspossessionsfromany location, allowing remote work with the same confidentiality and safety structures at the Future plus’s Sydney office. Create an Encrypted Databasefor Data storage:- Make sure several economic or otherwise delicate data, including contributor names, is stored in an encoded databank. Monetary numbers, Pins and all other data should never be
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS deposited in simple text (Sun 2014). With encryption, if Future plus’s other safety procedures fail and an assailant does get contact with company records, they unable to do anything with them. It is both the organization’s last line of protectionandthe single most significant object the company can do to defend the confidentiality of future plus contributors. If future plus cannot have enough money to supply and preserve contributor’s data onsite. It is not a big problem because sufficiently of cloud-based storing sites try to deal with high-level safety at realistic amounts (QC 2016). Furthermore, be clear about the records the future plus does stock, and what future plus does with it. Fate plus website should have apredictable confidentiality strategy page outlining precisely what contributor material will be recorded. Strong Password:- When future plus have lots of data, it looks like an excessive impression to either uses a similar keyword for all financial records or use simple, user friendly passwords. While future plus cannot have a roughly in what organization’s donors use as pin away on the website. Passwords that involve figures and signs in addition to letters are decent, as are lengthier pins, so set these as necessities when operators set up their financial records and personal information (Zhang 2018).One object this organization does notwant to do isneed vital systematic deviations. Amazingly, this can reason operators to select less protected passwords due to the apparent annoyance of continuously altering them. There is an acceptable mark to walk between protection and difficulties, of course, but with main cybercrimes as mutual as they are, it possibly most significant to be excessively alert. Experience employee:- To accomplish the processes of the future, plus, they have employed both full time and part-timestaff.Thefull-timesupervisorcontainsaWorkingManager,anAuditor,a
8 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Development Officer, two Situation Officers, and three provision staff. There are three part-time employees provided that additional maintenance to the Circumstance Officers with suitability payments and appointments to the applicant learners, also offered that informs students who obtain help from Future Plus.At this moment, future plus enhance their business structure then they try to employ more employee for system control (Borgesius, Gray and van 2015). If these employees are more experience in the technical field and they are very much known for the database maintaining. So it is very much helpful for data protection of future plus donor. If future plus trained there employee by the experienced trainer, then this training may be beneficial for the organization. 24*7 monitoring:- If future plus creates a good impact in between the Australian people, then they should monitortheirwebsitesineverymomentlike24*7(Tremblay-BoireandPrakash2017). Previously Future Plus delivers their part-time staff with transportable devices to take on-site case records throughout their website calls and direct these to the workplace via protected infrastructures. Since they supply delicate material about their contributors, students were receiving contributions, as well as payment particulars such as bank details and credit card details. Proper working maintenance:- The working procedure of the future plus should be ethical. There are two processes. One is the Student registration process, and other is the donor information process. The student registration procedure is mainly related to the student personal details, their qualification and student account. And another donor information process is related to the donor's name, address, contact details and payment information (Zhanget al. 2015). Any donor can choose the student
9 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS and provide him with the donation and this donation directly connected to the student account. The regular donor who also donate and then this organization provide these donations in the student account. So via future plus is the oldest scheme and the organization should implement the new model of working structure then it is more reliable. The IT technician must observe the whole thing if they follow any unethical incident immediately block this student ID or donor ID. Unique privacy facility for contributor:- Basically, the future plus works for society. It is very much interesting to work culture for Australian people. A rival company of the future plus always try to humiliate this company. If FUTURE PLUS WEBSITE STUDENT DETAILSDONOR DETAILS NAME QUALIFIACTIONO STUDENT ACCOUNT NAME CONTACT DETAILS PAYMENT DETAILS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS future plus authority was very much aware of this, then it should be right for their organization. The backward economic students are very much lucky to get this opportunity. The future plus also try to spread this work culture through social media and national media. If this company invent new facilities for donors, then they are more interested in this company. So the main facilities are security (Kent 2016). If it is possible when every employee is concern about their donor security. If they recruit professional technician, then this is very much helpful for this organization. The IT officials categorised this the donor from level 1, level 2 in according to the contribution. Every donor who donates high or low money is equally important to the future plus. Future plus should complete their security task in a respectful manner. Conclusion:- Future plus is the Australian charitable organization. They started the current educational project for backward economic student. They provide education with a free of cost. Many Australian people contribute some donations to this organization. The Sydney based organization try to secure their donor privacy data. So for a reason, if they should implement modern structures of database and also recruit some professional technician, then they create an extraordinary impact on Australian society. In this paper, the writer discusses how future plus creates a good security structure for their contributor. Data storage policy and privacy strategy are very much crucial for the future plus to maintain social respect.
11 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS References:- Bandara, I., Ioras, F. and Maher, K., 2014. Cyber security concerns in e-learning education. Borgesius, F.Z., Gray, J. and van Eechoud, M., 2015. Open data, privacy, and fair information principles: Towards a balancing framework.Berkeley Technology Law Journal,30(3), pp.2073- 2131. Bredenoord, A.L., Mostert, M., Isasi, R. and Knoppers, B.M., 2015. Data sharing in stem cell translational science: policy statement by the international stem cell forum ethics working party. Regenerative medicine,10(7), pp.857-861. Costa-Cabral, F. and Lynskey, O., 2017. Family ties: the intersection between data protection and competition in EU Law.Common Market Law Review,54(1), pp.11-50. DSS, P., 2016. Payment Card Industry Data Security Standards.International Information Security Standard. Hess, A.N., LaPorte-Fiori, R. and Engwall, K., 2015. Preserving patron privacy in the 21st century academic library.The Journal of Academic Librarianship,41(1), pp.105-114. Kent, A.D., 2016. Cyber security data sources for dynamic network research. InDynamic Networks and Cyber-Security(pp. 37-65). Novikov,R.A. andTomilov,Y.V., 2015. Dimerizationof donor–acceptorcyclopropanes. Mendeleev Communications,1(25), pp.1-10. QC, F.G., Muraszkiewicz, J. and Vavoula, N., 2016. The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns.Computer Law & Security Review,32(2), pp.205-217.
12 INFORMATION SECURITY MANAGEMENT OF FUTUREPLUS Sargeant, A. and Jay, E., 2014.Fundraising management: analysis, planning and practice. Routledge. Sun, H., Liu, S., Lin, W., Zhang, K.Y., Lv, W., Huang, X., Huo, F., Yang, H., Jenkins, G., Zhao, Q. and Huang, W., 2014. Smart responsive phosphorescent materials for data recording and security protection.Nature communications,5, p.3601. Tremblay-Boire, J. and Prakash, A., 2017. Will you trust me?: how individual american donors respond to informational signals regarding local and global humanitarian charities.VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations,28(2), pp.621-647. Van Zoonen, L., 2016. Privacy concerns in smart cities.Government Information Quarterly, 33(3), pp.472-480. Watts, D. and Casanovas, P., 2018. Privacy and Data Protection in Australia: a Critical overview. Zhang, D., 2018, October. Big data security and privacy protection. In8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press. Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X. and Luo, H.H., 2015. Security and privacy for mobilehealthcarenetworks:fromaqualityofprotectionperspective.IEEEWireless Communications,22(4), pp.104-112.