Sample content
Risky Situations
Note three types of sensitive information involved with each situation. Then, note three ways each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end of the table.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer details
Illegal accessibility
Terminal illegal access to client account information as well as particulars.
Modification of client particulars
Hackers acquired illegal accessibility and changed client particulars and information.
Copying of client particulars
Illegal access to client particulars and copying of client details.
Transaction details
Scam
Access to deal details and modifying the facts for malicious goal.
Hacking
Illegal access to deal data and details.
Tapping
Get
1. CMGT 400 Week 1 Risky Situations
Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/
Sample content
Risky Situations
Note three types of sensitive information involved with each situation. Then, note
three ways each information item could be misused or harmed. For each of these,
2. note at least one likely finding that you would include in a risk analysis report of the
organization. Finally, answer the questions at the end of the table.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer details
Illegal accessibility
Terminal illegal access to client account information as well as particulars.
Modification of client particulars
Hackers acquired illegal accessibility and changed client particulars and
information.
Copying of client particulars
Illegal access to client particulars and copying of client details.
Transaction details
Scam
Access to deal details and modifying the facts for malicious goal.
Hacking
Illegal access to deal data and details.
Tapping
3. Get illegal access to deal info on a specific deal and using the data for private
benefit.
Account Details
Illegal accessibility
Getting security passwords and security information on an account and accessing
it for private benefit.
Hacking
Illegal access and alteration of the account information.
Mistakes and omission
Deliberate or accidental omissions and mistakes on info and data.
Situation 2 – Facebook Page (Organization or Personal – Specify Which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Status update (organizations)
Illegal accessibility and possible upgrade of the company position.
Other people access companies face book page and upgrading the position
without the knowledge of manager.
Improper status upgrade
Company employees or outsiders submit improper status upgrade.
Bad publicity
4. Fears on bad advertising as a consequence of improper status upgrades.
Account information (personal)
Illegal modification of account information
Private accounts modified by unauthorized people.
Incorrect account information details
Users provide incorrect or wrong private information and particulars.
Imitation of account information
Some users impersonate other people accounts by using their names along with
other information.
Post and comments
Undesirable posts
Unauthorized articles from private accounts.
Undesirable and improper comments
Unauthorized and improper remarks on articles and position.
Bad publicity by articles and remarks from the open public and unknown pictures
and video clips.
The illegal anonymous upload of pictures and video clips that could lead to bad
publicity.
Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
5. Likely Finding in Risk Analysis Report
Asset details
Illegal getting of company assets
Picture phones are used to get company assets which lead to publicity of the
assets to the general public.
Getting asset information
The picture phones might also be used to get information on assets for example
shade, size, model along with other details and information.
Circulation of pictures on organization assets
Circulation of the pictures by texting and multimedia messages.
Security codes
Getting of company security codes.
Picture phones may get security codes.
Transfer of security codes data and data details
The grabbed pictures of security codes may be circulated or sent by the picture
phones.
Illegal access to security codes by image taking using photo phones.
The photo p
http://uopexam.com/product/cmgt-400-week-1-risky-situations/