Submitted by: Submitted by projectshadow
Views: 10
Words: 826
Pages: 4
Category: Science and Technology
Date Submitted: 01/05/2016 10:33 PM
University of Phoenix Material
Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
|Situation 1 – Online Banking System |
|Information Affected |Potential Harm (Risk) |Likely Finding in Risk Analysis Report |
|Account Details |Copying of account details |Medium |
| |Modifications of account details |Medium |
| |Selling of account details for private benefit |High |
|Company Information |Scamming details and facts |High |
| |Outside hacking for modifying or copying information |High |
| |Illegal obtaining of passwords and usernames for access |Medium |
|Customer Information...