college algebra

1850 Words Sep 27th, 2014 8 Pages
Risky Situations CMGT/400 Version 2�� PAGE * MERGEFORMAT �11���

_University of Phoenix Material_

_RISKY SITUATIONS_

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

SITUATION 1 - ONLINE BANKING SYSTEM

INFORMATION AFFECTED

POTENTIAL HARM (RISK)

LIKELY FINDING IN RISK ANALYSIS REPORT

Personal Information

Personal property damage and loss

With financial institutions keeping a record of where a person lives, that can put their physical security at risk as
…show more content…


SITUATION 3 - PICTURE PHONES IN THE WORKPLACE

INFORMATION AFFECTED

POTENTIAL HARM (RISK)

LIKELY FINDING IN RISK ANALYSIS REPORT

Privacy

Client information

Many companies in corporate offices have client specific practices and if that information is captured in a photo, it will be online and a hacker could use that information in detrimental ways.

Corporate information

Since a lot of people upload photos as soon as they take them, many photos automatically add a location stamp, which would be valuable information to a hacker.

Corporate layouts

People taking photos on production floors or near any security cameras help criminals easily case the offices.

professionalism

reputations

Allowing employees to have camera phones on a production floor, comes across as unprofessional and unsecure.

Quality of employees

Whenever a company looks at their employees and they are posting photos of themselves at work, they are expected to be working and in dress code. This can give criminals an idea of the types of people that are hired at the location and enforcement of management the location

Dress code

To a person looking to gain illegal access to information or a location, knowing the dress code will make it much easier for them to blend in with the average worker without being detected.

security

Computer monitors being left unlocked

All it takes is one work
Open Document