week 4
K1.4 The role and types of deterrent business control techniques in protecting the digital security of an organisation:
Deterrent controls are pre-emptive security measures that are designed to discourage or dissuade people from attempting to carry out harmful or unauthorised actions.
Rather than stopping or detecting threats directly, deterrents work by:
-
Raising awareness that controls are in place
-
Increasing the perceived risk of getting caught or punished
-
Encouraging good behaviour and compliance
Think of deterrents as the organisation saying:
ðŸâ£ï¸ "Don’t even think about it!"
Types of Deterrent Control Techniques
Deterrent controls can be physical or administrative.
Physical Deterrent Controls
These create a visible presence that discourages unauthorised access or behaviour.
Type | Description |
---|---|
Security Guards | Trained personnel that deter intruders or policy violations through presence and authority. |
Alarm Systems | Audible and/or silent alarms warn intruders that they’ve been detected. |
Visible Surveillance | Cameras that are clearly placed to show that the area is being monitored. |
These make people think twice before trying anything malicious, such as breaking in or tampering with equipment.
Administrative Deterrent Controls (Policies and Procedures)
These are organisational rules and formal expectations that discourage inappropriate or risky behaviour.
Type | Description |
---|---|
Standard Operating Procedures (SOPs) | Instructions for secure behaviour, such as how to activate alarms or perform fire drills. |
Employment Contracts – Codes of Conduct | Contracts may include behaviour rules, warning that poor conduct may lead to dismissal or legal action. |
Acceptable Use Policies (AUPs) | Clearly outline how systems can and cannot be used. Help discourage misuse or abuse of IT systems. |
These controls create awareness and define clear consequences, which can discourage risky or harmful actions.
Design a Deterrent Plan for a School Computer Room
Scenario:
Your school wants to discourage students from misusing the computers and trying to access restricted files. You have been asked to create a deterrent plan.
Task:
Choose two physical and two administrative deterrent controls.
For each control, explain:
What it is
How it works as a deterrent
What behaviour it helps prevent
Example (start):
Control: CCTV above computer stations
ââ¬â¹Ã¢â¬â¹Ã¢â¬â¹Ã¢â¬â¹Ã¢â¬â¹Ã¢â¬â¹Ã¢â¬â¹ How it deters: Students are less likely to break rules if they know they’re being watched
Prevents: Vandalism, unauthorised access, unplugging equipment
Optional Extension:
Write a short Acceptable Use Policy (AUP) for the computer lab/ room.
Last Updated
2025-07-11 13:42:16
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 3←
PrevWeek 4←
PrevWeek 5←
Prev→
Next