University of Phoenix Material
Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Bank Account Numbers
Can be used to steal the user’s funds.
Low/medium risk, high probability
Can be used by terrorist organizations for money laundering.
Very high risk, medium possibility
Loss of brand reputation to the bank as
…show more content…
Low/medium risk, high probability
Can be used to fund terrorist organizations.
Very high risk, medium possibility
Loss of reputation for business as being not secure. medium risk, medium possibility
Product database
Prices can be altered without authorization, causing loss of revenue and unhappy customers.
High risk, low probability
All product information can be deleted causing major problems for the company.
Very high risk, medium probability
Product details can be altered or deleted to misinform customers or discourage them from purchasing products
Medium risk, medium probability
Personal customer information (SSNs, addresses, email addresses, etc.).
Customer’s identities can be stolen.
High risk, high probability
Can provide stalkers with additional information about their “prey”.
High risk, medium probability
Information can be deleted, severely impacting marketing of the organization.
Medium/high risk, medium probability
Situation 5 – Real-World Application
(such as CRM, ERP, other internal or external organizational systems – pick one and specify)
Internal Payroll System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Employee Checking Account numbers
Can be changed so employee paychecks are sent to wrong account where money can be
Risk for most people is an accepted part of everyday life e.g. catching a bus or walking to the shop etc... will carry some element of risk. Risk is associated with our health, safety, security, well being, employment, education, daily activities, using resources and equipment and community participation. Some adults such as those who are disabled or who are older are usually discouraged from taking risks with their budgeting, planning, employment and their daily living skills usually because people fear for their limitations or that they might hurt themselves or others. Everyone has the right to take risks and make
In order to create a successful marketing plan, a situational analysis must be conducted on AllStar Brands Medicine Group. This situational analysis will be an internal and external analysis and will include the 5Cs, known as Context, Competitors, Customers, Collaborators, and Company. To begin the situational analysis, it is critical to ask, "Where are we now?" The situational analysis will allow for our company to understand the current situation further and make better informed decisions for the future when discussing our marketing strategy. After the marketing strategy has been discussed, the marketing mix will be a direct result of those marketing strategies created.
The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.
Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.
g) Biological assets related to agricultural activity that are measured at fair value less costs of disposal
Identify at least 3-5 potential information security risks that the lab may be exposed to and propose counter measures for addressing those risks. Identify security technology and products that could be used to protect the lab environment from these risks. Use
P1. Identify the threats and the consequences of a failure in securities that exist to the security of people, property and premises in a public service.
Each flowchart step is placed in the “Lane” for the group responsible for completing the task (Marketing, Sales, HR, etc.).
In this paper, I will identify security threats that Bank of America faces today. In addition, I will describe the techniques and processes used to identify the vulnerabilities and threats, describe risks to the information and related vulnerabilities within Bank of America when utilizing components of the web. Discussions on BoA safeguard against legal issues will be addressed followed by the types of social data that potentially cause problems for this bank institute. In conclusion, I will explain the legal, ethical, and regulatory requirements Bank of America utilize for the protection of the organization.
Confidentiality must be met in the storage, processing, and transmission of data in an organization. For example, we are going to look at a major recent data breach. On March 8, 2017, the US department of homeland security sent Equifax and notice to patch a vulnerability in versions of the Apache Struts software. On March 9, Equifax dispersed the information to applicable personnel. Although told to apply the patch, Equifax security team did not find
List the fraud risk factors that the CPA firm might encounter if they accept this audit engagement. Be sure to include a discussion of all items that will probably require special attention during the audit. For each of these fraud risk factors, indicate how the auditor should follow up on each potential problem if the engagement is accepted. Use the following format:
How will I develop this trait? I will go above the standard way of doing things. In life you get out what you put in. So when I do something I will do a little extra because nothing is wrong with that. In school teachers look for that risk-taker. They look for that person who wants to try new things, who wants to learn a different way, and who wants to work with new people. So this trait is very important for me to develop.
As a company, would you describe PPI as having an identifiable philosophy of moral values? How do its policies contribute to this philosophy?
Situation Ethics An Anglican theologian Joseph Fletcher developed situation Ethics. Legalism is the idea that there are fixed moral laws which are to be obeyed at all times. Antinomianism is the idea that there are no fixed moral principles but that one acts morally spontaneously. Fletcher rejects Legalism because it cannot accommodate 'exceptions to the rule'.
Joe Van West is an American who was working as an Operations Manager in Taipei, Taiwan when he got a call offering him a job in Mexico as a President of the Mexican subsidiary of Appliances United. After applying for the job he got approved and moved to the said country. There Van West and his family got help from Antonio Hernandez, President of Manufacturing, with settling down. He and Mrs. Hernandez introduced them to various clubs and influential people. In general The Hernandez contributed a lot to Van West’s accustoming and developed a good relationship.