Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Client’s personal information.
Hardware failure.
High
Software failure.
High
Internal espionage. medium Webpage security
Lack of enforced security protocols.
High
Cross site scripting
Medium
UI Redress Attack
Low
Physical data storage
Natural disaster.
High
Electrical fire.
High
Hardware failure.
Medium
Situation 2 – Facebook Page
Personal
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Social standings.
Exposed information into social media groups.
High
Risk of being ostracized by peers. medium In some cases psychological anguish. low Private information.
Data mining. medium Explication medium Termination of account. low Malicious intent.
Defacing personal Face book page.
Medium
Deletion of contacts. medium Cancellation. low Situation 3 – Picture Phones in the Workplace
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Network security
Compromised so-called closed network due to smart phone hotspots inside of the work environment.
High
Collection of physical snapshots used to exploit physical security has to secure communication locations.
High
Security camera mapping identifying through research physical limitations of surveillance equipment. medium Employee personal security
Compromise internal user account. medium Access to confidential files
High
Interoffice retaliation. medium Physical security
Office mapping through use of photos
Low
Snapshots of key codes been entered
High
Photos