Preview

CMGT400r4 risky situations

Satisfactory Essays
Open Document
Open Document
670 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT400r4 risky situations
University of Phoenix Material

Risky Situations

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer Data

Someone could steal customer’s identity
Customer information can be viewed by unauthorized people

Someone do something that could affect credit rating (obtaining credit card with your information)

Someone could sell your information

Employee Information
Someone could steal personal information
Information can be viewed by unauthorized people

Someone could sell your information

Account Information
Someone could access your accounts
Information could be stolen by unauthorized people.

Someone could steal your money

Situation 2 – Facebook Page
(organization or personal – specify which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Personal Identifiable Information
Someone can steal your information
Unauthorized individuals can view your information

Personal Identifiable Information of friends and family members
Someone could steal personal information of someone you know
Unauthorized individuals can view another person’s information

Location Information
You could update status or check-in somewhere and everyone could know where you are and who knows what could possibly happen.
Anyone could know where you are

Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Company Information
Someone could take pictures of sensitive company data or information
Unauthorized access to information

Customer Information
Someone could

You May Also Find These Documents Helpful

  • Satisfactory Essays

    5. Explain the agreed ways of working with your employer in relation to the following areas: data protection, grievance, conflict management, antidiscriminatory practice, Health & Safety, confidentiality & whistleblowing…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Wawa

    • 539 Words
    • 3 Pages

    3. Identify a crisis that the organization has faced or is facing and analyze how it was or is being handled by the organization (include an evaluation of the organization’s response to the crisis in your analysis).…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    hshjaxikz

    • 643 Words
    • 4 Pages

    4.5 Explain why it is important to record and report all incidents, discussions and decisions concerning risk taking…

    • 643 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Threat identification. That is, give a detailed description of the incident and how it is an HS concern.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Online shopping – this could lead to the loss of private information like card numbers and passwords and leading to identity fraud.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Handle Information Level2

    • 748 Words
    • 3 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.…

    • 748 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You may not think that you should care if your identity is stolen, but you really should. This can badly damage…

    • 566 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Based on the e-Activity, evaluate the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Suggest how the company may have presented the breach and / or responded differently once the breach was discovered. Provide support for your rationale.…

    • 820 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    And to big business that has no proven cause to use such information. Privacy – to prevent intrusion of privacy Policy of immediate notification to consumer when personal information was compromised Set up legal team specifically working with legal authorities to keep the company in the loop and so the company knows early what is coming and plan to handle. Corporate Action Plan – to mitigate future possibility of incidents Set up a crisis/risk management team to assess possible crises and key indicators, set guidelines and handbooks, crisis plan, training (on a regular basis and with everyone involved), simulations, and design suspicion report and incident report Re-assess the rules of business conduct (as above) and announce so that every stakeholder can follow Increase employee awareness & alarm system Establish complaints division – to review inaccuracies, correct errors.…

    • 375 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    |Define information risk and explain how auditing and assurance services play|1, 2, 3 |48, 51 |…

    • 5073 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    The first issue was to determine the actions moving forward when dealing with confidentiality. The second issue was the reporting of misleading information in a report of a case study and the bad side effects.…

    • 642 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Technology Information

    • 555 Words
    • 3 Pages

    3. Give three business examples of data that must be processed to provide useful information…

    • 555 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Write a report that discusses the events and their implications for auditors. Your discussion should include:…

    • 570 Words
    • 3 Pages
    Satisfactory Essays