cmgt400 r2 risky circumstances Assignment

п»їUniversity of Phoenix az Material

Dangerous Situations

Discover three types of hypersensitive information included in each situation. Then, explain three ways in which each info item could possibly be misused or harmed. For every of these, be aware at least one probably finding that you will include in a risk examination report of the organization. Finally, answer the questions by the end.

Situation 1 – On the net Banking Program

Information Affected

Potential Injury (Risk)

Very likely Finding in Risk Analysis Report

Client Transactions

Not authorized access to consumer accounts

Illegitimate accessing of customer consideration by cyber criminals or fraudsters

Tampering of customer data

Account access and consumer data could be copied simply by illegal get-togethers

Stealing of customer's info

Account numbers and security passwords could be thieved and access by hacker Accounts Information

Hacking by simply fraudsters

Customer information can be stolen or perhaps compromised

Mistakes and omits

Customer details could be incorrectly or intentionally changed

Permission/Unauthorized gain access to

Passwords and personal accounts data get by illegal parties could possibly be used for malevolent purposes Credit Information

Tapping

Credit data used by someone else

Scam

Entry to information that was customized with destructive intent.

Hacking

Access awarded to buyer data and details.

Condition 2 – Facebook Site

(organization or perhaps personal – specify which)

Information Influenced

Potential Damage (Risk)

Very likely Finding in Risk Evaluation Report

Personal data

Imitation of account information and possible id theft Consumer impersonates additional user's accounts by using the additional person's info.

modification of account information

Accounts used by an unauthorized consumer.

Incorrect account information

User makes numerous accounts with completely wrong information.

Status update – Business data

Negative publicity

Deceiving information that may potentially inflame some buyers

Unauthorized usage of account

Data can be altered or ruined

Messages sent to customers

The wrong messages could wind up staying sent to consumers, thus causing legal issues Post and responses – Organization info

Poor publicity as a result of remarks from the public and uploading of pictures or videos Negative feedback can decrease customers and cause controversy for the business enterprise.

Undesirable and improper feedback

Unauthorized, impolite, abrasive, or improper remarks on corporation position.

Improper or undesirable posts

Illegal posts via private accounts.

Situation 3 – Picture Phones in the Workplace

Information Influenced

Potential Injury (Risk)

Most likely Finding in Risk Analysis Report

Reliability codes

Writing of organizational security requirements

Pictures of codes or perhaps codes being used can be provided for anyone.

Transfer of protection codes and data information.

Security rules can be circulated or directed by photo phone from an insider.

Codes will be obtained by making use of zoom on camera cellphone

User is definitely watched applying code from afar and the code is used maliciously by a felony at a later time. Property information

Photographs taken of information on a monitor

Phone can be used to take photos of customer data or business info on a screen and used maliciously in another period.

Circulation of organization information or asset information Photographs are directed viral or sent to a person with malicious intent of an company assets.

Finding asset details from a distance

Many phones which has a camera have a zoom lens feature, the asset info can be obtained from another customer's computer from afar and employed later. Storage area details

Safe-keeping information get

Use of details could be utilized to locate an organization's placed goods, money, or goods.

Retrieving safe-keeping location info

Photo can be taken associated with an organization's secure or safe-keeping facility

Syndication of information

Photos may be sent to other people

Scenario 4 – E-Commerce Buying Site...

Why Might an Insurance Claim Become Returned? Dissertation

One of the main reasons that the insurance company would return a claim would be because the patient did not have coverage at the time the services had been…...

Read..

The Completely happy Prince Composition

The " HAPPY” Royal prince Persuasive Article " There is absolutely no mystery so great as misery” – The " Happy” Prince What does a person need to know…...

Read..
 The Roaring 20s Essay

The Roaring 20s Essay

The roaring 20's was a time of consumerism, leisure, and rebellion. The women of 1920 smoked, consumed, danced, and voted. That they cut their head of hair, wore make-up, and…...

Read..

Understand Diverse Food and Beverage Development and Service Systems Essay

Contents 1 . Introduction1 2 . Understand distinct food and beverage development and service systems2 installment payments on your 1 Discuss the characteristics of food production and…...

Read..
 Bureaucracy in the Philippines - Book Review Composition

Bureaucracy in the Philippines - Book Review Composition

The review The Bureaucracy in the Philippines Dr . Onofre D. Corpuz ------------------------------------------------- Start of Community Administration: School of the Korea, 1957. 268 pp. This…...

Read..

The Great Features of Alexander Fleming Research Paper

The Great Attributes of Alexander Fleming In the story Of Mice and Guys, George and Lennie demonstrate many qualities of friendship. Three features that can help enhance a sincere friendship…...

Read..