Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer Transactions
Unauthorized access to customer accounts
Illegal accessing of customer account by hackers or fraudsters
Tampering of customer data
Account access and customer data could be copied by illegal parties
Stealing of customer’s information
Account numbers and passwords could be stolen and access by fraudsters
Accounts Information
Hacking by fraudsters
Customer information can be stolen or compromised
Errors and omits
Customer info could be mistakenly or purposely changed
Permission/Unauthorized access
Passwords and personal account data obtain by illegal parties could be used for malicious purposes
Credit Information
Tapping
Credit information used by someone else
Scam
Access to information that was modified with malicious intent.
Hacking
Access granted to customer data and details.
Situation 2 – Facebook Page
(organization or personal – specify which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Personal data
Imitation of account information and possible identity theft
User impersonates other user’s accounts by using the other person’s information.
modification of account information
Accounts used by an unauthorized user.
Incorrect account information
User makes numerous accounts with incorrect information.
Status update – Business data
Negative publicity
Misleading information that could potentially irritate some customers
Unauthorized access to account
Information can be manipulated or damaged
Messages