Risky Situations

Submitted by: Submitted by

Views: 428

Words: 1597

Pages: 7

Category: Science and Technology

Date Submitted: 05/27/2014 10:36 PM

Report This Essay

University of Phoenix Material

Risky Situations

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

|Situation 1 – Online Banking System |

|Information Affected |Potential Harm (Risk) |Likely Finding in Risk Analysis Report |

|Customer Information |Illegally accessing information |Illegal access to the customer’s account information as well as personal |

| | |information. |

| |Modification of customer information |Hackers can access and change customer information at will. |

| |Copying of customer information |Hackers can make copies of customer information and either use it or sell it. |

|Transaction Details |Scam |Access to deal details and modifying the facts of the deal for a higher, more |

| | |malicious goal. |

|...