Preview

CMGT400r4 risky situations se

Satisfactory Essays
Open Document
Open Document
748 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT400r4 risky situations se
University of Phoenix Material

Risky Situations

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Client’s personal information.
Hardware failure.
High

Software failure.
High

Internal espionage. medium Webpage security
Lack of enforced security protocols.
High

Cross site scripting
Medium

UI Redress Attack
Low
Physical data storage
Natural disaster.
High

Electrical fire.
High

Hardware failure.
Medium

Situation 2 – Facebook Page
Personal
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Social standings.
Exposed information into social media groups.
High

Risk of being ostracized by peers. medium In some cases psychological anguish. low Private information.
Data mining. medium Explication medium Termination of account. low Malicious intent.
Defacing personal Face book page.
Medium

Deletion of contacts. medium Cancellation. low Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Network security
Compromised so-called closed network due to smart phone hotspots inside of the work environment.
High

Collection of physical snapshots used to exploit physical security has to secure communication locations.
High

Security camera mapping identifying through research physical limitations of surveillance equipment. medium Employee personal security
Compromise internal user account. medium Access to confidential files
High

Interoffice retaliation. medium Physical security
Office mapping through use of photos
Low

Snapshots of key codes been entered
High

Photos

You May Also Find These Documents Helpful

  • Satisfactory Essays

    that is used to connect computers and the users. Infrastructure also includes the transmission media such as the lines through telephones television satellites as well as any sort of routers antennas and any other devices that would control the transmission paths. When it comes to managing infrastructures this refers to managing the computing facilities as well as the key elements such as the computer databases the information management systems and the application software. One of the risks in managing the IS would be the globalization issues. Globalization does have its positive side such as opportunities for companies to grow however with that there is also the chance of complex array of operating risks. Without the right infrastructure to conquer these sorts of risks it can lead to company shutdown and no company wants that to happen. Here are a few ways to prevent that from happening.…

    • 774 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 670 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    1.3 Explain what risk assessment is and how this is managed in the work setting…

    • 1959 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Threat identification. That is, give a detailed description of the incident and how it is an HS concern.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1.3 Explain what a risk assessment is and how it is managed in the work setting…

    • 1201 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Wawa

    • 539 Words
    • 3 Pages

    3. Identify a crisis that the organization has faced or is facing and analyze how it was or is being handled by the organization (include an evaluation of the organization’s response to the crisis in your analysis).…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Explain the agreed ways of working with your employer in relation to the following areas: data protection, grievance, conflict management, antidiscriminatory practice, Health & Safety, confidentiality & whistleblowing…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    hshjaxikz

    • 643 Words
    • 4 Pages

    4.5 Explain why it is important to record and report all incidents, discussions and decisions concerning risk taking…

    • 643 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cyp Core 3.3

    • 407 Words
    • 2 Pages

    • What to do when there is a safeguarding concerns including the procedure and actions • The importance of following the principles…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1.3. Explain what risk assessment is and how this is managed in the work setting…

    • 3026 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays

Related Topics