Preview

Risky Situation

Good Essays
Open Document
Open Document
1497 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risky Situation
University of Phoenix Material

Risky Situations

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Bank Account Numbers
Can be used to steal the user’s funds.
Low/medium risk, high probability

Can be used by terrorist organizations for money laundering.
Very high risk, medium possibility

Loss of brand reputation to the bank as being less secure. medium risk, medium possibility
Account Numbers of Bills stored in Bill Pay
Used to access bill information and change information as personal attack on individual.
Low/medium risk, medium probability

Used to access additional information about user through user’s profile through that particular bill.
Medium risk, medium/high probability

Close account without user’s approval or them being aware as a personal attack against them.
Medium/high risk, high probability.
Stock/investment information
Investments can be transferred to someone else’s name without users knowing or approval.
High risk/low probability

Additional investments can be made in user’s name that are likely to fail, or to illegally support the investment company.
High risk/low probability

Investments can be donated to charity without user’s consent or knowledge, leaving user with $0 left.
High risk/low probability

Situation 2 – Facebook Page
(organization or personal – specify which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Access to friends list.
Can allow undesired persons to gain knowledge about someone that does not want their information seen by anyone but people they

You May Also Find These Documents Helpful

  • Satisfactory Essays

    c. Discuss a third audit strategy that might be used to assess control risk at a high level. Explain why this strategy will not support a low control risk assessment.…

    • 6750 Words
    • 23 Pages
    Satisfactory Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 748 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 670 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Determine reasonably foreseeable internal threats that could result in unauthorized disclosure, misuse, alteration, or destruction of customer information or information systems, assess the likelihood and potential damage of these threats, taking into consideration the sensitivity of customer information, and evaluate the sufficiency of existing policies, procedures, customer information systems, and other safeguards in place to control…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    JOUR 371 chapter notes

    • 2505 Words
    • 11 Pages

    EXAMPLE: Suppose Bob has hemorrhoids, a severe case — and frequently Googles “hemorrhoid relief” and other, similar terms. Bob may be surprised when he gets an e-mail with a coupon for Preparation H. He might be aghast to discover he has actually put what he has put what he considered to be personal, medical information on the Internet for a marketing company to harvest. And it could go on from there. Suppose Bob applies for a job as an airline pilot and…

    • 2505 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    read

    • 311 Words
    • 2 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Financial abuse: Financial abuse is the illegal or unauthorised use of a person’s money, property, pension book or other valuables…

    • 3231 Words
    • 10 Pages
    Good Essays
  • Good Essays

    1.3- Explain what risk assessment is and how this is managed in the work setting.…

    • 1319 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Victoria Chemicals

    • 864 Words
    • 4 Pages

    The treatment of conflicts of interest and other ethical dilemmas that may arise in investment decisions.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    people’s everyday lives without one ever knowing. This is a direct invasion of privacy. What…

    • 625 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rising Inflation

    • 1556 Words
    • 7 Pages

    This money can neither be invested in the capital markets as Income tax department monitors their…

    • 1556 Words
    • 7 Pages
    Good Essays

Related Topics