Preview

cmgt400 r2 risky situations Assignment

Good Essays
Open Document
Open Document
1164 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cmgt400 r2 risky situations Assignment
University of Phoenix Material

Risky Situations

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer Transactions
Unauthorized access to customer accounts
Illegal accessing of customer account by hackers or fraudsters

Tampering of customer data
Account access and customer data could be copied by illegal parties

Stealing of customer’s information
Account numbers and passwords could be stolen and access by fraudsters
Accounts Information
Hacking by fraudsters
Customer information can be stolen or compromised

Errors and omits
Customer info could be mistakenly or purposely changed

Permission/Unauthorized access
Passwords and personal account data obtain by illegal parties could be used for malicious purposes
Credit Information
Tapping
Credit information used by someone else

Scam
Access to information that was modified with malicious intent.

Hacking
Access granted to customer data and details.

Situation 2 – Facebook Page
(organization or personal – specify which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Personal data
Imitation of account information and possible identity theft
User impersonates other user’s accounts by using the other person’s information.

modification of account information
Accounts used by an unauthorized user.

Incorrect account information
User makes numerous accounts with incorrect information.
Status update – Business data

Negative publicity
Misleading information that could potentially irritate some customers

Unauthorized access to account
Information can be manipulated or damaged

Messages

You May Also Find These Documents Helpful

  • Satisfactory Essays

    c. Discuss a third audit strategy that might be used to assess control risk at a high level. Explain why this strategy will not support a low control risk assessment.…

    • 6750 Words
    • 23 Pages
    Satisfactory Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 748 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 670 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Double Deceit Summary

    • 1476 Words
    • 6 Pages

    Double Deceit: A True Story of a Nigerian Scam Dr. Agnes Chambers-Glenn, privately published, 106-14 Greenview Drive, Kingston, Ontario, K7M 7T5, docglenn23@yahoo.ca, 2013. 244pp. ISBN 978-1-4669-9438-6. CAD$15 In the novel, Double Deceit by Dr. Agnes Chambers-Glenn, the author follows the story of a medical doctor, Dr. Hassan Mashaal, a long time retire, on his pursuit as he takes down the money scammers who were responsible for the US $10.5 million scandal.…

    • 1476 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Threat identification. That is, give a detailed description of the incident and how it is an HS concern.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Wawa

    • 539 Words
    • 3 Pages

    3. Identify a crisis that the organization has faced or is facing and analyze how it was or is being handled by the organization (include an evaluation of the organization’s response to the crisis in your analysis).…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 410 Project Management

    • 1187 Words
    • 4 Pages

    Risk Identification. State the importance of identifying risks and categorizing them as high, medium or low probability. Explain why risks associated with the critical path of the project need special attention. Respond to at least two of your classmates’ postings.…

    • 1187 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Based on the e-Activity, evaluate the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Suggest how the company may have presented the breach and / or responded differently once the breach was discovered. Provide support for your rationale.…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hackers who access a business or non-business organizations’ networks find files that contain personal data of employees or volunteers, proprietary and/or trade secrets, and financial data that allows for theft, fraud, and extortion. One such exploit involved the student “ Daniel Beckwit,…

    • 819 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Social Care

    • 1031 Words
    • 6 Pages

    All personal data must be secured at all time. Appropriate technical and organisational measures must be taken against unauthorised or unlawful processing of personal data and against accidental lost, destruction or damage.…

    • 1031 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    References: International Business, T 2013, '2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public ',International Business Times, 5 December, Regional Business New…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    paper risk finance

    • 2376 Words
    • 8 Pages

    1. State the types of risks that a corporation/institution could face. Provide triggers for specific risk events, associated consequences and mitigants.…

    • 2376 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    3. The information concerns some significant misconduct by the organization or some of its members.…

    • 1286 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Identify the different components of business risk the organization may face in relation to its accounting system and financial management.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays