Computer Threats

Submitted by: Submitted by

Views: 187

Words: 1536

Pages: 7

Category: Business and Industry

Date Submitted: 01/13/2014 08:28 PM

Report This Essay

Risky Situations

Note three types of sensitive information involved with each situation. Then, note three ways each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end of the table.

|Situation 1 – Online Banking System |

|Information Affected |Potential Harm (Risk) |Likely Finding in Risk Analysis Report |

|Customer details |Illegal accessibility |Terminal illegal access to client account information as well as particulars. |

| | | |

| | Modification of client particulars |Hackers acquired illegal accessibility and changed client particulars and |

| | |information. |

| |Copying of client particulars |Illegal access to client particulars and copying of client details. |

|Transaction details |Scam |Access to deal details and modifying the facts for malicious goal. |

| |Hacking...