Risky Situations CMGT/400 Version 2�� PAGE \* MERGEFORMAT �11���
University of Phoenix Material
Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
Situation 1 - Online Banking System | ||
Information Affected | Potential Harm (Risk) | Likely Finding in Risk Analysis Report |
Personal Information | Personal property damage and loss | With financial institutions keeping a record of where a person lives, that can put their physical security at risk as well, as it leaves the person vulnerable to property theft or damage. |
Identity Theft | Since financial institutions keep a lot of information on their customers, if a someone were able to access that information that person would be able to wreak havoc on that person's life | |
Company reputation | If a company has personal information released, the customers will feel less secure with their banking and will result in a business loss for the company | |
Financial Information | Opening additional accounts | Criminals can use the information contained in a financial report to open additional lines of credit, or other fraudulent accounts |
Unauthorized withdrawals | With access to account numbers and credit card numbers a criminal can use wire transfers to move money to another account, make illegal withdrawals, or write fraudulent checks. | |
Spending habits | Criminals can monitor spending habits of a victim as not to arouse suspicion to continue using the member's identity. | |
Computer information | ||
�
Situation 2 - Facebook Page (organization or personal - specify which) | ||
Information Affected | Potential Harm (Risk) | Likely Finding in Risk Analysis Report |
Personal information | Education information | Many people are proud of where they went to... |