2640-1665054891113-Unit - 05 - Security
2640-1665054891113-Unit - 05 - Security
2640-1665054891113-Unit - 05 - Security
HigherNationals
Internalverificationofassessmentdecisions–BTEC(RQF)
INTERNALVERIFICATION–ASSESSMENTDECISIONS
Programmetitle BTEC Higher National Diploma in Computing
.Iresha Jayarathne
Assessor InternalVerifier
Unit 05: Security
Unit(s)
Providing a suitable security solution for METROPOLIS CAPITAL Bank
Assignmenttitle
S.A Hasantha Indrajith Dissanayaka
Student’sname
Listwhichassessmentcriteri Pass Merit Distinction
atheAssessorhasawarded.
INTERNALVERIFIERCHECKLIST
Dotheassessmentcriteriaawardedmatchtho
seshownintheassignmentbrief? Y/N
Isthe Pass/Merit/Distinction
gradeawardedjustifiedbythe assessor’s Y/N
comments on the student work?
Hastheworkbeenassessedaccurate
Y/N
ly?
Isthefeedbacktothestudent:
Givedetails:
• Constructive?
Y/
• Linkedtorelevantassessmentcriteria
? NY/
• Identifyingopportunitiesforimpr N
ovedperformance?
• Agreeingactions? Y/
NY/
Doesthe
Y/N
assessmentdecisionneedamending?
Assessorsignature Date
InternalVerifiersignature Date
Programme Leader
Date
signature(ifrequired)
.
Confirm actioncompleted
Remedialactiontaken
Givedetails:
Assessorsignature Date
InternalVerifiersig
Date
nature
Programme
Date
Leadersignature(ifrequir
ed)
.
ResubmissionFeedback:
InternalVerifier’sComments:
Signature&Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.
.
Pearson
Higher Nationals in
Computing
Unit 5 : Security
.
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover
sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on
each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg:
Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory
information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing)
for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to
complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing
system to avoid plagiarism. You have to provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL
or at worst you could be expelled from the course
.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
hasanthapcnew123@gmail.com 30.11.2022
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
.
Assignment Brief
Student Name /ID Number S.A Hasantha Indrajith Dissanayaka
Unit Tutor
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections
as appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide an end list of references using the Harvard referencing system.
METROPOLIS CAPITAL Bank is one of the leading private banking service providers in Sri Lanka. It operates
over 100 branches and 500 ATM machines across the island as well as 8 Branches overseas. In order to provide
.
their services, METROPOLIS CAPITAL Bank has a primary datacenter located in Colombo and a Secondary
datacenter located in Galle. Each branch and ATM must have connectivity to the core banking system to be able
to operate normally. In order to establish the connectivity between datacenters, branches and ATM machines,
each location has a single ISP link. This link provides VPN services between branches, ATMs and datacenters as
well as MPLS services for the bank and it establishes connectivity between datacenters, ATMs, and branches.
METROPOLIS CAPITAL Banks Head Office is a 5 Story Building in Kollupitiya with the Ground Floor
allocated for Customer Services, the First Floor allocated for HR, the Second Floor allocated for Meeting Rooms
and Senior Executive Staff, the Third Floor is allocated for the Technical Support Team and the Fourth Floor
hosts High Performance Servers running core banking systems. Fifth Floor is for some other outside companies
that are not related with the METROPOLIS CAPITAL Bank. Other than this, METROPOLIS CAPITAL bank
provides a lot of services to customers including online and mobile banking facilities. Therefore, their core
banking system must communicate with several outside systems and all communication between outside systems,
Data centers and the Head Office is protected by a single firewall. In Addition, METROPOLIS CAPITAL Bank
has recently implemented a bring your own device (BYOD) concept for Senior Executive Staff and HR
Departments and to facilitate this, they are providing employee WiFi as well as a guest WiFi Hotspot.
The bank has signed agreements, AMCs, contracts and NDAs with several Local and foreign IT service vendors.
Some local vendors provide services and supports to foreign companies. METROPOLIS CAPITAL Banks
Technical Support Team is a local third-party vendor, contracted by METROPOLIS CAPITAL Bank and
managed by their Supply chain management officer. The Technical Support Team provides onsite and remote
support for their customers.
METROPOLIS CAPITAL bank strictly follows the rules and regulations enforced by the government and the
Central Bank. Therefore, they have obtained the ISO 31000:2009 certification. In addition to this, the areas of
datacenters, branches, ATM and HQ is covered by CCTV and 24x7 monitoring is happening. Other security
functions like VA scanning, internal auditing, and security operation done by the bank employees. They have
purchased a VA scanning tool, Privilege access management (PAM) system, Endpoint detection and respond
(EDR) system, Data loss prevention (DLP) tool, Web application firewall (WAF) and Secure mail gateway which
are managed by the Technical Support Team.
It has been reported that an emergency is likely to occur where a work from home situation may be initiated.
Therefore, you have been employed by METROPOLIS CAPITAL Bank as a Network Security Analyst to
recommend and implement a suitable Security solution to facilitate this situation.
.
Activity 01
Discussand assess the security procedures and types of security risks METROPOLIS CAPITAL Bank
may faceunder its current status and evaluate a range of physical and virtual security measures that
can be employed to ensure the integrity of organizational IT security. You also need to analyze the
benefits of implementing network monitoring systems for METROPOLIS CAPITAL Bank with valid
reasons in order to minimize security risks identified and enhance the organizational security.
Activity 02
2.1 Discuss how an incorrect/improper configuration for network infrastructure such as firewall and VPN could
impact METROPOLIS CAPITAL Bank. Assess IT security risks that may face by the employees of
METROPOLIS CAPITAL Bank and propose how the organization can facilitate their employees with a “Secure
remote working environment”.
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and its Clients to increase
network performance. (Support your answer with suitable illustrations).
i) Static IP,
ii) NAT
iii)DMZ
Activity 03
Review risk assessment proceduresfor METROPOLIS CAPITAL Bank to protect itself and its clients. Explain the
mandatory data protection laws and procedures which will be applied to data storage solutions provided by
METROPOLIS CAPITAL Bank. Explain the topic "ISO 31000 risk management methodology" and summarize
the ISO 31000 risk management methodology and its application in IT security.Analyze possible impacts to
organizational security resulting from an IT security audit.Recommend how IT security can be aligned with
organizational Policy, detailing the security impact of any misalignment.
Activity 04
4.1 Design and Implement suitable security policy to prevent misuse and exploitations in line with
.
METROPOLIS CAPITAL Bank using the Organizational policy tools for the given scenario,
While evaluating and justifying the suitability of the tools used in an organizational policy to meet business needs.
Identify the stakeholders who are subject to the METROPOLIS CAPITAL Bank and describe the role of these
stakeholders to build security audit recommendations for the organization.
4.2 Discuss and present a disaster recovery plan for METROPOLIS CAPITAL Bank for all their sites to
guarantee maximum reliability to their clients. (Student mustdevelop a PowerPoint-based presentation which
illustrates the recovery plan within 15 minutes of time including justifications and reasons for decisions and
options used).
.
Grading Rubric
Grading Criteria Achieved Feedback
Table of Contents
What is the Network Security?.................................................................................................18
What is an organizational security procedure?.........................................................................20
Types of security procedures?......................................................................................................................20
What is the Networking Monitoring System?..........................................................................21
What are network monitoring systems?...................................................................................21
How to Implement Network Monitoring System.....................................................................21
The Benefits of Networking Monitoring..................................................................................22
What is the Physical Security?.................................................................................................23
Examples for Physical Security....................................................................................................................23
Observing biological security concerning the building:....................................................................23
Access Control...................................................................................................................................24
Emergency preparedness and security testing...................................................................................25
Surveillance tools..............................................................................................................................25
Log and trail maintenance.................................................................................................................26
What is the Virtual Security?...................................................................................................26
Examples for Virtual Security......................................................................................................................26
What is the Firewall?................................................................................................................28
Why Are Firewalls Important?.....................................................................................................................28
Uses of firewalls...........................................................................................................................................29
How Does a Firewall Work?........................................................................................................................29
What Is a VPN?........................................................................................................................30
A Transaction without Using a VPN............................................................................................................30
A Transaction without Using a VPN............................................................................................................31
A Transaction Using a VPN.........................................................................................................................32
What is a DMZ Network?........................................................................................................33
Why DMZ Networks are Important.............................................................................................................33
Examples of Demilitarized Zone (DMZ).....................................................................................................34
What is a Network Address Translation (NAT).......................................................................35
How Does NAT Work?................................................................................................................................35
NAT Types...................................................................................................................................................36
Static NAT.........................................................................................................................................36
An Organizations’ security of the building, security for employees and financial security are all a priority.
However, the company comprises many other assets that require security and its IT infrastructure. Every
organization’s network is the lifeline that employees rely on to do their jobs and subsequently make money
for the organization. Therefore it’s important to recognize that your IT infrastructure is a must that they
require top security.
An important example of physical security is providing adequate facilities to build a secure building. To
do this, you should prefer to use strong locks, anti-theft doors for the building as well as strong and anti-
Access Control
Securing your entries keeps unwanted people out, and lets authorized users in. A modern keyless entry
system is your first line of defense, so having the best technology is essential. There are a few different
types of systems available; this guide to the best access control systems will help you select the best system
for your building. The main things to consider in terms of your physical security are the types of
credentials you choose, if the system is on-premises or cloud-based, and if the technology meets all your
unique needs. When it comes to access methods, the most common are keycards and fob entry systems,
and mobile credentials. Some access control systems allow you to use multiple types of credentials on the
same system, too. Access control that uses cloud-based software is recommended over on-premises servers
for physical security control plans, as maintenance and system updates can be done remotely, rather than
requiring someone to come on-site (which usually results in downtime for your security system). Cloud-
based technology also offers great flexibility when it comes to adding entries and users, plus makes
integrating with your other security systems much easier. (Openpath, 2022)
Education is a key component of successful physical security control for offices. If employees, tenants, and
administrators don’t understand the new physical security policy changes, your system will be less
effective at preventing intrusions and breaches. Once your system is set up, plan on rigorous testing for all
the various types of physical security threats your building may encounter. You should run security and
emergency drills with your on-site teams, and also test any remote features of your physical security
controls to make sure administrators have the access they need to activate lockdown plans, trigger unlock
requests, and add or revoke user access. Communicating physical security control procedures with staff
and daily end users will not only help employees feel safer at work, it can also deter types of physical
security threats like collusion, employee theft, or fraudulent behavior if they know there are systems in
place designed to detect criminal activity.
Surveillance tools
Surveillance is crucial to physical security control for buildings with multiple points of entry. The most
common type of surveillance for physical security control is video cameras. Video management systems
(VMS) are a great tool for surveillance, giving you visual insight into activity across your property.
Exterior doors will need outdoor cameras that can withstand the elements. Another consideration for video
surveillance systems is reporting and data. To get the most out of your video surveillance, you’ll want to be
able to see both real-time footage, as well as previously recorded activity. In physical security control,
Figure 4 Firewall
Uses of firewalls
Firewalls can incorporate a security information and event management strategy (SIEM) into
cybersecurity devices concerning modern organizations and are installed at the network perimeter
of organizations to guard against external threats as well as insider threats.
Firewalls can perform logging and audit functions by identifying patterns and improving rules by
updating them to defend the immediate threats.
They are also used for antivirus applications.
Firewalls can be used for a home network, Digital Subscriber Line (DSL), or cable modem having
static IP addresses. Firewalls can easily filter traffic and can signal the user about intrusions.
In-home devices, we can set the restrictions using Hardware/firmware firewalls.
How Does a Firewall Work?
A firewall welcomes only those incoming traffic that has been configured to accept. It distinguishes
between good and malicious traffic and either allows or blocks specific data packets on pre-established
security rules. These rules are based on several aspects indicated by the packet data, like their source,
destination, content, and so on. They block traffic coming from suspicious sources to prevent cyberattacks.
(Deshpande, 2022)
What Is a VPN?
A Virtual Private Network (VPN) is a connection between a VPN server and a VPN client. It is a secure
tunnel-like connection across the internet. The VPN client connects to the internet by interacting with the
VPN server through an encrypted tunnel. Since the communication between the client and the server
happens through this tunnel, attackers cannot hack the information.
First, your computer connects to the Internet Service Provider - ISP, which provides access to the internet.
You then send your bank details to the bank's server using your IP address. Internet Protocol address or IP
address is a unique address that recognizes a particular device, be it a laptop or a smartphone on the
internet. When these details pass through the public network, the hacker who passively watches the
network traffic intercepts it. This is a passive cyber-attack where the hacker collects your bank details
without being detected. More often or not, in such an attack, payment information is likely to be stolen.
The targeted data here are the victims' usernames, passwords, and other personal information. Such an
Unsecured connection exposes your IP address and bank details to the hacker when it passes through the
public network. This way, your information gets stolen.
First, your computer connects to the Internet Service Provider - ISP, which provides access to the
internet.
You then send your bank details to the bank's server using your IP address. Internet Protocol
address or IP address is a unique address that recognizes a particular device, be it a laptop or a
smartphone on the internet.
When these details pass through the public network, the hacker who passively watches the network
traffic intercepts it. This is a passive cyber-attack where the hacker collects your bank details
without being detected. More often or not, in such an attack, payment information is likely to be
stolen. The targeted data here are the victims' usernames, passwords, and other personal
information.
Such an unsecured connection exposes your IP address and bank details to the hacker when it
passes through the public network. This way, your information gets stolen. (Duggal, 2022)
Picture your bank transaction to be happening in a tunnel that is invisible to the hacker. In such a
case, the hacker will not be able to spot your transaction. And that is precisely what a VPN does. A
Virtual Private Network, more often known as VPN, creates a secure tunnel between your device
and the internet.
For using a VPN, your first step would be to install a software-based technology known as the VPN
client on your laptop or smartphone that would let you establish a secure connection.
The VPN client connects to the Wi-Fi and then to the ISP. Here, the VPN client encrypts your
information using VPN protocols. Data is encrypted to make sure it is secure. Next, the VPN client
establishes a VPN tunnel that connects to the VPN server within the public network.
The VPN tunnel protects your information from being intercepted by the hacker. Your IP address
and location are changed at the VPN server to enable a private and secure connection. Finally, the
VPN server connects to your bank's server in the last step, where the encrypted message is
decrypted.
This way, your original IP address is hidden by the VPN, and the VPN tunnel protects your data
from being hacked. This explains how VPN makes your data anonymous and secure when it passes
through the public network and the difference between a regular connection and a VPN connection.
(Duggal, 2022)
On many home networks, internet enabled devices are built around a local area network which accesses the
internet from a broadband router. However, the router serves as both a connection point and a firewall,
automating traffic filtering to ensure only safe messages enter the local area network. So, on a home
network, a DMZ can built by adding a dedicated firewall, between the local area network and the router.
While more expensive, this structure can help to protect internal devices from sophisticated attacks better
protects the inside devices from possible attacks by the outside.DMZ’s are an essential part of network
security for both individual users and large organizations. They provides an extra layer of security to the
computer network by restricting remote access to internal servers and information, which can be very
damaging if breached. (barracuda, 2022)
Typically, one should locate all services involving an external network in the demilitarized zone if a DMZ
is implemented. Six examples of the systems deployed within a DMZ include
Web servers
It’s possible for web servers communicating with internal database servers to be deployed in a DMZ. This
makes internal databases more secure, as these are the repositories responsible for storing sensitive
information. Web servers can connect with the internal database server directly or through application
firewalls, even though the DMZ continues to provide protection.
FTP servers
FTP, which stands for file transfer protocol, is a method of transferring data to any computer connected to
the internet anywhere in the world. It is a standard network protocol used to transfer files between a client
and a server on a computer network. An FTP server can host important content on a company’s website
and allow direct file engagement. As a result, it should always be isolated from crucial internal systems.
Email servers
A mail server, also known as a mail transfer agent, refers to a program that accepts incoming emails from
local users and remote senders and transmits outgoing messages for delivery. It is common practice to store
individual emails and the user database that maintains a record of login credentials on servers that cannot
directly access the internet. As a result, an email server is developed or deployed within the DMZ to
communicate with and access the email database while avoiding direct exposure to potentially dangerous
traffic.
DNS servers
A DNS server stores a database of public IP addresses and their associated hostnames. It usually resolves
or converts those names to IP addresses when applicable. DNS servers use specialized software and
communicate with one another using dedicated protocols. Placing a DNS server within the DMZ prevents
external DNS requests from gaining access to the internal network. Installing a second DNS server on the
internal network can also serve as additional security.
Proxy servers
A proxy server is often paired with a firewall. Other computers use it to view Web pages. When another
computer requests a Web page, the proxy server retrieves it and delivers it to the appropriate requesting
machine. Proxy servers establish connections on behalf of clients, shielding them from direct
communication with a server. They also isolate internal networks from external networks and save
bandwidth by caching web content.
VoIP servers
Although voice over internet protocol (VoIP) servers may connect with both the internal network and the
Internet, internal network access is restricted, and firewalls are configured to analyze all traffic entering the
internal LAN.
An IP address (internet protocol address) acts as a unique identifier for a device that connects to the
internet. Computers use IP addresses to locate and talk to each other on the internet, much the same way
people use phone numbers to locate and talk to one another on the telephone. An IP address can provide
information such as the hosting provider and geographic location data.
As an example, when a user wants to visit google.com, their computer asks a domain name system (DNS)
server -- analogous to a telephone information operator -- for the correct dotted quad number. The DNS
maps the domain name to the IP address, which is needed to identify a device with a network protocol. In
this case, the DNS server will link the quad number -- analogous to a phone number -- for google.com, and
your computer uses the answer it receives to connect to the WhatIs.com server.
Businesses that rely on IP addresses for mail, FTP and web servers can have one, unchanging
address.
Static IP addresses are preferred for hosting voice over IP, VPNs and games.
They can be more stable in the case of an interruption in connectivity -- meaning packet exchanges
won't be lost.
They allow for file servers to have faster file uploads and downloads.
A static IP will make it easier for any geolocation services to access where a device is.
Static IPs are better for remote access to a computer
Factors such as size, growth rate, resources, and asset portfolio affect the depth of risk assessment models.
Organizations can carry out generalized assessments when experiencing budget or time constraints.
However, generalized assessments don’t necessarily provide the detailed mappings between assets,
associated threats, identified risks, impact, and mitigating controls.
If generalized assessment results don’t provide enough of a correlation between these areas, a more in-
depth assessment is necessary.
Steps of Security Risk Assessment Model
Identification
Determine all critical assets of the technology infrastructure. Next, diagnose sensitive data that is created,
stored, or transmitted by these assets. Create a risk profile for each.
Assessment
Administer an approach to assess the identified security risks for critical assets. After careful evaluation
and assessment, determine how to effectively and efficiently allocate time and resources towards risk
mitigation. The assessment approach or methodology must analyze the correlation between assets, threats,
vulnerabilities, and mitigating controls.
Mitigation
Define a mitigation approach and enforce security controls for each risk.
Prevention
Implement tools and processes to minimize threats and vulnerabilities from occurring in your firm’s
resources.
The risk management process outlined in the ISO 31000 standard includes the following activities:
Risk identification
Risk analysis
Risk evaluation
Risk treatment
Establishing the context
Monitoring and review
The purpose of ISO 31000
While people working in the many different forms of risk management always have the same goal, to
provide a sound basis for decisions on whether risks are acceptable and, if necessary, obtain reliable
information how they can be dealt with, there are many different definitions of risk and of the risk
management process elements and many different versions of the process to be followed. These have all
developed for good historical reasons but individuals and organizations, whether they are for profit or not,
regulated or regulator, need to make confident and balanced decisions about all risks they have to deal
with, on a consistent and reliable basis. Decision makers are uncomfortable about resolving pieces of
apparently similar but fundamentally different information, obtained from different processes and with
different assumptions, that are described using the same words but that have different meanings.
Risk treatment
It allows to select and implement options to deal with the risk, also in an iterative way, which implies:
formulate and select risk treatment options, plan and implement treatment, evaluate efficacy, decide
whether residual risk is acceptable, otherwise perform additional treatment.
Weighs your current security structure and protocols and helps you define a standard for your
organization with the audit results.
Mitigates hacker-risks by discovering potential hacker entry points and security flaws well in
advance.
Verifies how compliant your IT infrastructure is with top regulatory bodies and helps you conform
in accordance.
Finds lag in your organization’s security training and awareness and helps you make informed
decisions towards its betterment.
How to Prepare for an IT Audit?
Some types of disasters that organizations can plan for include the following:
Application failure
Communication failure
Power outage
Natural disaster
Malware or other cyber attack
Data center disaster
Your IT disaster recovery strategy should incorporate procedures and policies for pre-disaster, mid-
disaster, and post-disaster. Here are some factors to keep in mind when forming your IT disaster recovery
procedures:
Pre-disaster
A bit of preparation can go a long way when forming a disaster recovery plan For example, it helps to
know exactly which humans and machines have access to your critical applications, servers, privileged
credentials, and system admin rights. It’s important to test the resiliency of your systems and outline a
secondary line of command for admins. That way, if something happens to an admin—like injury, illness,
or account compromise—someone else can step in and take command. While you’re at it, it’s also a good
idea to outline a secondary line of access to mission-critical data and customer-facing systems.
Mid-disaster
People can act unpredictably during an emergency, so it’s important to have clear instructions in place to
walk them through a disaster. Team members also need to know where to go for access while the disaster
is taking place and how to engage secondary lines of command. To this end, you should clearly outline
how to get to your backup servers and access your admin credentials. Forming clear instructions will
eliminate confusion and expedite the recovery process—making sure productivity and services are largely
unscathed.
Post-disaster
After the disaster ends, team members need to know when to return to normal workflows and move off
backup systems. Once the disaster is in the rear-view mirror, you should continue replication to make sure
you are still syncing to backup systems. At the end of the process, it’s critical to debrief the mission.
Analyze what worked, what did not, and any gaps that arose during the process. Use those findings to
iterate and build a more resilient plan for the next incident.
Types of Stakeholders
Stakeholders can be anyone with influence or anyone who can be influenced by the project. We’ve already
seen that there can be many stakeholders, something that we’ll discuss below. All stakeholders can be
broken into two groups: internal stakeholders and external stakeholders. Let’s take a look at both.
1. Internal Stakeholders
Internal stakeholders are within the organization. The project directly impacts them as they serve and are
employed by the organization managing it. Internal stakeholders can include employees, owners, the board
of directors, project managers, investors and more.
2. External Stakeholders
External stakeholders are outside of the organization and are indirectly impacted by the project. They’re
influenced by the organization’s work but are not employees of the organization. These people can be
suppliers, customers, creditors, clients, intermediaries, competitors, society, government and more.
References