Preview

Risky Situation

Good Essays
Open Document
Open Document
1497 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risky Situation
University of Phoenix Material

Risky Situations

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Bank Account Numbers
Can be used to steal the user’s funds.
Low/medium risk, high probability

Can be used by terrorist organizations for money laundering.
Very high risk, medium possibility

Loss of brand reputation to the bank as being less secure. medium risk, medium possibility
Account Numbers of Bills stored in Bill Pay
Used to access bill information and change information as personal attack on individual.
Low/medium risk, medium probability

Used to access additional information about user through user’s profile through that particular bill.
Medium risk, medium/high probability

Close account without user’s approval or them being aware as a personal attack against them.
Medium/high risk, high probability.
Stock/investment information
Investments can be transferred to someone else’s name without users knowing or approval.
High risk/low probability

Additional investments can be made in user’s name that are likely to fail, or to illegally support the investment company.
High risk/low probability

Investments can be donated to charity without user’s consent or knowledge, leaving user with $0 left.
High risk/low probability

Situation 2 – Facebook Page
(organization or personal – specify which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Access to friends list.
Can allow undesired persons to gain knowledge about someone that does not want their information seen by anyone but people they

You May Also Find These Documents Helpful

  • Good Essays

    1.3- Explain what risk assessment is and how this is managed in the work setting.…

    • 1319 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Victoria Chemicals

    • 864 Words
    • 4 Pages

    The treatment of conflicts of interest and other ethical dilemmas that may arise in investment decisions.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wawa

    • 539 Words
    • 3 Pages

    3. Identify a crisis that the organization has faced or is facing and analyze how it was or is being handled by the organization (include an evaluation of the organization’s response to the crisis in your analysis).…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Threat identification. That is, give a detailed description of the incident and how it is an HS concern.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    1. Itemize the nature of the information security breach at ChoicePoint and how this adversely affected the organization. Be sure to include both tangible and intangible losses in preparing your response. [table]…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discuss how the values for threat and vulnerability combine to indicate the overall risk the organization faces.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    people’s everyday lives without one ever knowing. This is a direct invasion of privacy. What…

    • 625 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rising Inflation

    • 1556 Words
    • 7 Pages

    This money can neither be invested in the capital markets as Income tax department monitors their…

    • 1556 Words
    • 7 Pages
    Good Essays

Related Topics