SlideShare une entreprise Scribd logo
1  sur  5
CMGT 400 Week 1 Risky Situations
Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/
Sample content
Risky Situations
Note three types of sensitive information involved with each situation. Then, note
three ways each information item could be misused or harmed. For each of these,
note at least one likely finding that you would include in a risk analysis report of the
organization. Finally, answer the questions at the end of the table.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer details
Illegal accessibility
Terminal illegal access to client account information as well as particulars.
Modification of client particulars
Hackers acquired illegal accessibility and changed client particulars and
information.
Copying of client particulars
Illegal access to client particulars and copying of client details.
Transaction details
Scam
Access to deal details and modifying the facts for malicious goal.
Hacking
Illegal access to deal data and details.
Tapping
Get illegal access to deal info on a specific deal and using the data for private
benefit.
Account Details
Illegal accessibility
Getting security passwords and security information on an account and accessing
it for private benefit.
Hacking
Illegal access and alteration of the account information.
Mistakes and omission
Deliberate or accidental omissions and mistakes on info and data.
Situation 2 – Facebook Page (Organization or Personal – Specify Which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Status update (organizations)
Illegal accessibility and possible upgrade of the company position.
Other people access companies face book page and upgrading the position
without the knowledge of manager.
Improper status upgrade
Company employees or outsiders submit improper status upgrade.
Bad publicity
Fears on bad advertising as a consequence of improper status upgrades.
Account information (personal)
Illegal modification of account information
Private accounts modified by unauthorized people.
Incorrect account information details
Users provide incorrect or wrong private information and particulars.
Imitation of account information
Some users impersonate other people accounts by using their names along with
other information.
Post and comments
Undesirable posts
Unauthorized articles from private accounts.
Undesirable and improper comments
Unauthorized and improper remarks on articles and position.
Bad publicity by articles and remarks from the open public and unknown pictures
and video clips.
The illegal anonymous upload of pictures and video clips that could lead to bad
publicity.
Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Asset details
Illegal getting of company assets
Picture phones are used to get company assets which lead to publicity of the
assets to the general public.
Getting asset information
The picture phones might also be used to get information on assets for example
shade, size, model along with other details and information.
Circulation of pictures on organization assets
Circulation of the pictures by texting and multimedia messages.
Security codes
Getting of company security codes.
Picture phones may get security codes.
Transfer of security codes data and data details
The grabbed pictures of security codes may be circulated or sent by the picture
phones.
Illegal access to security codes by image taking using photo phones.
The photo p
http://uopexam.com/product/cmgt-400-week-1-risky-situations/

Contenu connexe

Plus de lorinerba

Plus de lorinerba (11)

MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
QNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 versionQNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 version
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

CMGT 400 Week 1 Risky Situations 2015 version

  • 1. CMGT 400 Week 1 Risky Situations Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/ Sample content Risky Situations Note three types of sensitive information involved with each situation. Then, note three ways each information item could be misused or harmed. For each of these,
  • 2. note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end of the table. Situation 1 – Online Banking System Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Customer details Illegal accessibility Terminal illegal access to client account information as well as particulars. Modification of client particulars Hackers acquired illegal accessibility and changed client particulars and information. Copying of client particulars Illegal access to client particulars and copying of client details. Transaction details Scam Access to deal details and modifying the facts for malicious goal. Hacking Illegal access to deal data and details. Tapping
  • 3. Get illegal access to deal info on a specific deal and using the data for private benefit. Account Details Illegal accessibility Getting security passwords and security information on an account and accessing it for private benefit. Hacking Illegal access and alteration of the account information. Mistakes and omission Deliberate or accidental omissions and mistakes on info and data. Situation 2 – Facebook Page (Organization or Personal – Specify Which) Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Status update (organizations) Illegal accessibility and possible upgrade of the company position. Other people access companies face book page and upgrading the position without the knowledge of manager. Improper status upgrade Company employees or outsiders submit improper status upgrade. Bad publicity
  • 4. Fears on bad advertising as a consequence of improper status upgrades. Account information (personal) Illegal modification of account information Private accounts modified by unauthorized people. Incorrect account information details Users provide incorrect or wrong private information and particulars. Imitation of account information Some users impersonate other people accounts by using their names along with other information. Post and comments Undesirable posts Unauthorized articles from private accounts. Undesirable and improper comments Unauthorized and improper remarks on articles and position. Bad publicity by articles and remarks from the open public and unknown pictures and video clips. The illegal anonymous upload of pictures and video clips that could lead to bad publicity. Situation 3 – Picture Phones in the Workplace Information Affected Potential Harm (Risk)
  • 5. Likely Finding in Risk Analysis Report Asset details Illegal getting of company assets Picture phones are used to get company assets which lead to publicity of the assets to the general public. Getting asset information The picture phones might also be used to get information on assets for example shade, size, model along with other details and information. Circulation of pictures on organization assets Circulation of the pictures by texting and multimedia messages. Security codes Getting of company security codes. Picture phones may get security codes. Transfer of security codes data and data details The grabbed pictures of security codes may be circulated or sent by the picture phones. Illegal access to security codes by image taking using photo phones. The photo p http://uopexam.com/product/cmgt-400-week-1-risky-situations/