SlideShare uma empresa Scribd logo
1 de 5
CMGT 400 Week 1 Risky Situations
Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/
Sample content
Risky Situations
Note three types of sensitive information involved with each situation. Then, note
three ways each information item could be misused or harmed. For each of these,
note at least one likely finding that you would include in a risk analysis report of the
organization. Finally, answer the questions at the end of the table.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer details
Illegal accessibility
Terminal illegal access to client account information as well as particulars.
Modification of client particulars
Hackers acquired illegal accessibility and changed client particulars and
information.
Copying of client particulars
Illegal access to client particulars and copying of client details.
Transaction details
Scam
Access to deal details and modifying the facts for malicious goal.
Hacking
Illegal access to deal data and details.
Tapping
Get illegal access to deal info on a specific deal and using the data for private
benefit.
Account Details
Illegal accessibility
Getting security passwords and security information on an account and accessing
it for private benefit.
Hacking
Illegal access and alteration of the account information.
Mistakes and omission
Deliberate or accidental omissions and mistakes on info and data.
Situation 2 – Facebook Page (Organization or Personal – Specify Which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Status update (organizations)
Illegal accessibility and possible upgrade of the company position.
Other people access companies face book page and upgrading the position
without the knowledge of manager.
Improper status upgrade
Company employees or outsiders submit improper status upgrade.
Bad publicity
Fears on bad advertising as a consequence of improper status upgrades.
Account information (personal)
Illegal modification of account information
Private accounts modified by unauthorized people.
Incorrect account information details
Users provide incorrect or wrong private information and particulars.
Imitation of account information
Some users impersonate other people accounts by using their names along with
other information.
Post and comments
Undesirable posts
Unauthorized articles from private accounts.
Undesirable and improper comments
Unauthorized and improper remarks on articles and position.
Bad publicity by articles and remarks from the open public and unknown pictures
and video clips.
The illegal anonymous upload of pictures and video clips that could lead to bad
publicity.
Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Asset details
Illegal getting of company assets
Picture phones are used to get company assets which lead to publicity of the
assets to the general public.
Getting asset information
The picture phones might also be used to get information on assets for example
shade, size, model along with other details and information.
Circulation of pictures on organization assets
Circulation of the pictures by texting and multimedia messages.
Security codes
Getting of company security codes.
Picture phones may get security codes.
Transfer of security codes data and data details
The grabbed pictures of security codes may be circulated or sent by the picture
phones.
Illegal access to security codes by image taking using photo phones.
The photo p
http://uopexam.com/product/cmgt-400-week-1-risky-situations/

Mais conteúdo relacionado

Mais de lorinerba

MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionlorinerba
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionlorinerba
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
QNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 versionQNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 versionlorinerba
 

Mais de lorinerba (11)

MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
MGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 versionMGT 498 Final Exam 2015 version
MGT 498 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
QNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 versionQNT 351 Final Exam Answers 2015 version
QNT 351 Final Exam Answers 2015 version
 

Último

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Último (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

CMGT 400 Week 1 Risky Situations 2015 version

  • 1. CMGT 400 Week 1 Risky Situations Link : http://uopexam.com/product/cmgt-400-week-1-risky-situations/ Sample content Risky Situations Note three types of sensitive information involved with each situation. Then, note three ways each information item could be misused or harmed. For each of these,
  • 2. note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end of the table. Situation 1 – Online Banking System Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Customer details Illegal accessibility Terminal illegal access to client account information as well as particulars. Modification of client particulars Hackers acquired illegal accessibility and changed client particulars and information. Copying of client particulars Illegal access to client particulars and copying of client details. Transaction details Scam Access to deal details and modifying the facts for malicious goal. Hacking Illegal access to deal data and details. Tapping
  • 3. Get illegal access to deal info on a specific deal and using the data for private benefit. Account Details Illegal accessibility Getting security passwords and security information on an account and accessing it for private benefit. Hacking Illegal access and alteration of the account information. Mistakes and omission Deliberate or accidental omissions and mistakes on info and data. Situation 2 – Facebook Page (Organization or Personal – Specify Which) Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Status update (organizations) Illegal accessibility and possible upgrade of the company position. Other people access companies face book page and upgrading the position without the knowledge of manager. Improper status upgrade Company employees or outsiders submit improper status upgrade. Bad publicity
  • 4. Fears on bad advertising as a consequence of improper status upgrades. Account information (personal) Illegal modification of account information Private accounts modified by unauthorized people. Incorrect account information details Users provide incorrect or wrong private information and particulars. Imitation of account information Some users impersonate other people accounts by using their names along with other information. Post and comments Undesirable posts Unauthorized articles from private accounts. Undesirable and improper comments Unauthorized and improper remarks on articles and position. Bad publicity by articles and remarks from the open public and unknown pictures and video clips. The illegal anonymous upload of pictures and video clips that could lead to bad publicity. Situation 3 – Picture Phones in the Workplace Information Affected Potential Harm (Risk)
  • 5. Likely Finding in Risk Analysis Report Asset details Illegal getting of company assets Picture phones are used to get company assets which lead to publicity of the assets to the general public. Getting asset information The picture phones might also be used to get information on assets for example shade, size, model along with other details and information. Circulation of pictures on organization assets Circulation of the pictures by texting and multimedia messages. Security codes Getting of company security codes. Picture phones may get security codes. Transfer of security codes data and data details The grabbed pictures of security codes may be circulated or sent by the picture phones. Illegal access to security codes by image taking using photo phones. The photo p http://uopexam.com/product/cmgt-400-week-1-risky-situations/