Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
|Situation 1 – Online Banking System |
|Information Affected |Potential Harm (Risk) |Likely Finding in Risk Analysis Report …show more content…
|
| |Damaged hardware – Hardware can be damaged from environmental disasters and |This is something that every bank needs to plan for and should be on risk |
| |cost the bank money in repairs and in down time. |analysis report |
| |Misuse of either software or hardware can cause systems to fail. |I would say there is a high chance of this appearing on a risk analysis report. |
|Situation 2 – Facebook Page |
|(organization or personal – specify which) |
|Information Affected |Potential Harm (Risk) |Likely Finding in Risk Analysis Report |
|Personal Information |Identity