Aller au contenu

Particular threats to humanitarian and international organizations#

bg left:20%


Nature of sensitive data and information#

bg left:20%

  • Personal data of beneficiaries
    • ex: name, address, medical situation, etc.
  • Financial information
    • ex: transactions, budgets, donations
  • Response and support plans
  • Internal and external communications
  • Locations of facilities and personnel

Potentially vulnerable infrastructure and networks#

bg left:20%

  • Poorly secured networks
    • ex: wireless networks (Wi-Fi)
  • Cloud-based data storage systems
  • Mobile applications and online software for collaboration
  • Outdated or unpatched IT infrastructure
  • IoT and other connected devices

Collaboration with various partners and stakeholders#

bg left:20%

  • Shared information with other NGOs, governments, and donors
  • Relationships with service providers
    • ex: hosting, communication
  • Many temporary access to systems
    • ex: volunteers and temporary providers
  • Interactions with local communities and beneficiaries

Operations in high-risk areas#

bg left:20%

  • Presence in conflict or crisis areas
  • Exposure to targeted cyber attacks by malicious actors
  • Increased vulnerability due to less secure local infrastructure
  • Risk of compromise of systems and communications during emergency response

Specific internal and external threats#

bg left:20%

  • Manipulation or detour of humanitarian aid for malicious purposes
  • State actors or armed groups seeking access to information to influence or control humanitarian operations
  • Cyber-espionage to obtain information about organizations' activities, strategies, partners and funding sources
  • Disclosure of sensitive information about beneficiaries, jeopardizing their safety and privacy
  • Internal threats from disgruntled employees, infiltrated volunteers, or partners with ulterior motives that can compromise organizational systems and data