SlideShare une entreprise Scribd logo
1  sur  5
CMGT 400 Week 1 Risky Situations
Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/
Sample content
Risky Situations
Note three types of sensitive information involved with each situation. Then, note
three ways each information item could be misused or harmed. For each of these,
note at least one likely finding that you would include in a risk analysis report of the
organization. Finally, answer the questions at the end of the table.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer details
Illegal accessibility
Terminal illegal access to client account information as well as particulars.
Modification of client particulars
Hackers acquired illegal accessibility and changed client particulars and
information.
Copying of client particulars
Illegal access to client particulars and copying of client details.
Transaction details
Scam
Access to deal details and modifying the facts for malicious goal.
Hacking
Illegal access to deal data and details.
Tapping
Get illegal access to deal info on a specific deal and using the data for private
benefit.
Account Details
Illegal accessibility
Getting security passwords and security information on an account and accessing
it for private benefit.
Hacking
Illegal access and alteration of the account information.
Mistakes and omission
Deliberate or accidental omissions and mistakes on info and data.
Situation 2 – Facebook Page (Organization or Personal – Specify Which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Status update (organizations)
Illegal accessibility and possible upgrade of the company position.
Other people access companies face book page and upgrading the position
without the knowledge of manager.
Improper status upgrade
Company employees or outsiders submit improper status upgrade.
Bad publicity
Fears on bad advertising as a consequence of improper status upgrades.
Account information (personal)
Illegal modification of account information
Private accounts modified by unauthorized people.
Incorrect account information details
Users provide incorrect or wrong private information and particulars.
Imitation of account information
Some users impersonate other people accounts by using their names along with
other information.
Post and comments
Undesirable posts
Unauthorized articles from private accounts.
Undesirable and improper comments
Unauthorized and improper remarks on articles and position.
Bad publicity by articles and remarks from the open public and unknown pictures
and video clips.
The illegal anonymous upload of pictures and video clips that could lead to bad
publicity.
Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Asset details
Illegal getting of company assets
Picture phones are used to get company assets which lead to publicity of the
assets to the general public.
Getting asset information
The picture phones might also be used to get information on assets for example
shade, size, model along with other details and information.
Circulation of pictures on organization assets
Circulation of the pictures by texting and multimedia messages.
Security codes
Getting of company security codes.
Picture phones may get security codes.
Transfer of security codes data and data details
The grabbed pictures of security codes may be circulated or sent by the picture
phones.
Illegal access to security codes by image taking using photo phones.
The photo p
http://uopexam.com/product/cmgt-400-week-1-risky-situations/

Contenu connexe

Plus de lorinerba

Plus de lorinerba (11)

MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
QNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 versionQNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 version
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

CMGT 400 Week 1 Risky Situations 2015 version

  • 1. CMGT 400 Week 1 Risky Situations Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/ Sample content Risky Situations Note three types of sensitive information involved with each situation. Then, note three ways each information item could be misused or harmed. For each of these,
  • 2. note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end of the table. Situation 1 – Online Banking System Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Customer details Illegal accessibility Terminal illegal access to client account information as well as particulars. Modification of client particulars Hackers acquired illegal accessibility and changed client particulars and information. Copying of client particulars Illegal access to client particulars and copying of client details. Transaction details Scam Access to deal details and modifying the facts for malicious goal. Hacking Illegal access to deal data and details. Tapping
  • 3. Get illegal access to deal info on a specific deal and using the data for private benefit. Account Details Illegal accessibility Getting security passwords and security information on an account and accessing it for private benefit. Hacking Illegal access and alteration of the account information. Mistakes and omission Deliberate or accidental omissions and mistakes on info and data. Situation 2 – Facebook Page (Organization or Personal – Specify Which) Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Status update (organizations) Illegal accessibility and possible upgrade of the company position. Other people access companies face book page and upgrading the position without the knowledge of manager. Improper status upgrade Company employees or outsiders submit improper status upgrade. Bad publicity
  • 4. Fears on bad advertising as a consequence of improper status upgrades. Account information (personal) Illegal modification of account information Private accounts modified by unauthorized people. Incorrect account information details Users provide incorrect or wrong private information and particulars. Imitation of account information Some users impersonate other people accounts by using their names along with other information. Post and comments Undesirable posts Unauthorized articles from private accounts. Undesirable and improper comments Unauthorized and improper remarks on articles and position. Bad publicity by articles and remarks from the open public and unknown pictures and video clips. The illegal anonymous upload of pictures and video clips that could lead to bad publicity. Situation 3 – Picture Phones in the Workplace Information Affected Potential Harm (Risk)
  • 5. Likely Finding in Risk Analysis Report Asset details Illegal getting of company assets Picture phones are used to get company assets which lead to publicity of the assets to the general public. Getting asset information The picture phones might also be used to get information on assets for example shade, size, model along with other details and information. Circulation of pictures on organization assets Circulation of the pictures by texting and multimedia messages. Security codes Getting of company security codes. Picture phones may get security codes. Transfer of security codes data and data details The grabbed pictures of security codes may be circulated or sent by the picture phones. Illegal access to security codes by image taking using photo phones. The photo p http://uopexam.com/product/cmgt-400-week-1-risky-situations/