Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer Data
Someone could steal customer’s identity
Customer information can be viewed by unauthorized people
Someone do something that could affect credit rating (obtaining credit card with your information)
Someone could sell your information
Employee Information
Someone could steal personal information
Information can be viewed by unauthorized people
Someone could sell your information
Account Information
Someone could access your accounts
Information could be stolen by unauthorized people.
Someone could steal your money
Situation 2 – Facebook Page
(organization or personal – specify which)
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Personal Identifiable Information
Someone can steal your information
Unauthorized individuals can view your information
Personal Identifiable Information of friends and family members
Someone could steal personal information of someone you know
Unauthorized individuals can view another person’s information
Location Information
You could update status or check-in somewhere and everyone could know where you are and who knows what could possibly happen.
Anyone could know where you are
Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Company Information
Someone could take pictures of sensitive company data or information
Unauthorized access to information
Customer Information
Someone could