Preview

college algebra

Powerful Essays
Open Document
Open Document
1862 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
college algebra
Risky Situations CMGT/400 Version 2�� PAGE * MERGEFORMAT �11���

_University of Phoenix Material_

_RISKY SITUATIONS_

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.

SITUATION 1 - ONLINE BANKING SYSTEM

INFORMATION AFFECTED

POTENTIAL HARM (RISK)

LIKELY FINDING IN RISK ANALYSIS REPORT

Personal Information

Personal property damage and loss

With financial institutions keeping a record of where a person lives, that can put their physical security at risk as well, as it leaves the person vulnerable to property theft or damage.

Identity Theft

Since financial institutions keep a lot of information on their customers, if a someone were able to access that information that person would be able to wreak havoc on that person's life

Company reputation

If a company has personal information released, the customers will feel less secure with their banking and will result in a business loss for the company

Financial Information

Opening additional accounts

Criminals can use the information contained in a financial report to open additional lines of credit, or other fraudulent accounts

Unauthorized withdrawals

With access to account numbers and credit card numbers a criminal can use wire transfers to move money to another account, make illegal withdrawals, or write fraudulent checks.

Spending habits

Criminals can monitor spending habits of a victim as not to arouse suspicion to continue using the member's identity.

Computer information



SITUATION 2 - FACEBOOK PAGE

(organization or personal - specify which)

INFORMATION AFFECTED

POTENTIAL HARM (RISK)

LIKELY FINDING IN RISK ANALYSIS REPORT

Personal information

Education information

Many people are proud of



References: Wm. Arthur Conklin, G. W. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition. In G. W. Wm. Arthur Conklin, _Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition_ (p. Chapter 20). McGraw-Hill Company.

You May Also Find These Documents Helpful

  • Good Essays

    This is implemented whenever a member makes a deposit or withdrawal in excess of $10,000. This is required due to criminal organizations requiring large amounts of money to complete transactions without being tracked.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Gothic Poe and Hawthorne

    • 1173 Words
    • 5 Pages

    Nathaniel Hawthorne and Edgar Allan Poe are considered masters of American gothic fiction. Gothic is a genre of literature that combines elements of both horror and romance. Jennifer Palladino cited Herman Melville who wrote “Gothic was nothing if not new and varied; yet at the same time, there was an unexpected mental growth as well, a dimensional growth in acuity of intelligence and refinement of consciousness.” Poe wrote more of a horror genre, and Hawthorne wrote more of dark and allegorical literature. Their characters were people of a certain society, and in those times, people of certain standards would associate together. They wrote about life and their political parties and what people could expect. Poe and Hawthorne define American literature by the use of symbolism, setting, themes and characterizing.…

    • 1173 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    This information could then be sold off to others, to be used in identity theft, having their money stolen or being added to various mailing lists.…

    • 1722 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Three Best Practices

    • 330 Words
    • 2 Pages

    Banks should always train employees on protecting customer’s information. Employees should never text or email customer’s information to anyone. “Employees need regular training on how to manage customer information, as well as on the laws and policies that are in place to protect it” (Trade, 2015). At the bank I work at we have tests on laws and policies to better understand how everything works. We always have to protect our customers so we can…

    • 330 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The Breach of Bank Secrecy by International Rogatory Letters Rio de Janeiro State University UERJ Faculdade de Direito The Breach of Bank Secrecy by International Rogatory Letters Student: Isabel Tandeitnik Husid Subject: International Law I Prof.: Marilda Rosado de Sá Ribeiro Isabel Tandeitnik Husid The Breach of Bank Secrecy by International Rogatory Letters Raises a lot of discussion the breach of banking account data confidentiality requested by passive international rogatory letters 1 , as the courts have been denying them, arguing that they have enforceability character, because of that they are unsusceptible to be fulfilled without forecasting treaty and that it would hurt the Brazilian public order, since the bank secrecy is included in the constitutional guarantees. International rogatory letters with enforceability character are note accepted in our national legal system, and this is common ground both in the courts as between the scholars, who defends that the International rogatory letter can only have as object a diligence to be conducted in Brazil, such as the service of process, intimations, hearing of whitnesses and obtaining evidences in general. On that way have decided the Supreme Court as seen in the following decision: “Sentença negatória de exequatur.…

    • 2615 Words
    • 11 Pages
    Better Essays
  • Good Essays

    New payment systems such as online banking, e-cash have enhanced the speed of money transfer over many jurisdictions with anonymity creates a new breed of problems.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Symmetric Encryption

    • 322 Words
    • 2 Pages

    References: Conklin, Wm. Arthur (William Arthur) (2010), Principles of Computer Security : CompTIA Security+ and Beyond. New York, NY: McGraw, Hill Publishers.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Usb Security Threats

    • 651 Words
    • 3 Pages

    Pfleging (2008) also writes how compromising confidential information “can involve privacy laws at the state and federal levels, dictating large fines. An organization 's reputation, and thereby its ability to attract new investors or customers, might be damaged or even destroyed.” Any corporation with an incident such as this could easily suffer great financial losses in today’s technical and struggling economy. Swartz (2006) states, “according to the 2005 “Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) Computer Crime and Security Survey," average financial losses from unauthorized access…

    • 651 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We hereby declare that this submission is our own work and that, to the best of our knowledge and belief, it contains no material previously published or written by another person nor material which has…

    • 5043 Words
    • 21 Pages
    Satisfactory Essays
  • Powerful Essays

    Besides of development of Economic activities, monetary related crimes are also increasing in both developed and underdeveloped countries. Almost in each country illegal transaction of money has been increased & these illegal money has been also used on various illegal activities.…

    • 23766 Words
    • 96 Pages
    Powerful Essays
  • Good Essays

    People who own a bank account often have a bankcard, which is used in cash point machines. All of their bank details are kept on a computer system if this computer was to fail the bank would have all of the information kept on a back up system. If the bank did not have a back up system all of the stakeholders of that particular bank would have problems the bank would lose all of the information on the members and employees of the bank. The members of the bank would not have access to the money that they have in the bank, as the bank would not know how much money each individual has in their account. In the future people may not have to carry cash around with them as everything may be paid for through computer systems with the use of a cash/credit card. People may not even leave their house to go shopping and go to work with the popularity of catalogues and shopping over the Internet forever increasing. This is made possible through the use of credit card details being given either over the Internet or the telephone. More and more companies are having their employees work from home and send the work that they have done via email and likewise the employees can send work to be done to the employees using this same method. Even meetings can take place without the employees being present through Tele-conferencing, which is also done over the Internet using a web camera and microphone. As these methods of shopping and working are increasing in popularity, advancements in the security of the technology are going to be needed if someone was to hack into your computer system and you gave out your credit details they would also be able to use your card. With teleconferencing if confidential details of the company…

    • 506 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technology had changed the way people obtain financial services. It has also save time and money allowing people to conduct banking efficiently. Technology has helped banking transform from bulk paper and waste to paperless communication and means of transferring funds. The technology evolved includes telephone banking (telephone technology), credit cards, debit cards (money transfer technology), electronic money, and automatic teller machines.(2) These technologies have created efficiency and time saving methods of conducting business for people. Some importantly, technology has lead to tighter security and safer methods of conducting business for everyone. Bank security or compliance officers use computers and technology to help ensure that banks understand, follows guidelines and control the risk of the complex and new world of financial services. Security has changes over many years through the advancement of technology, evolving from manual examining fraudulent activities to using advance computers and program that can identify fraudulent activities, checks, and even viruses (new age threat to banking). Technology advancement in banks has lead to convenience, speed, time saving and cheaper methods of conducting banking. Today, many people are slowly deleting traditional methods of utilizing financial services or money such as the change from checks to debit/credit cards and automatic payments.…

    • 2503 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Vfdcgfcf

    • 11376 Words
    • 46 Pages

    “Now that most transactions and exchanges have become electronic, you really don’t need to be an expert to predict that this will become, or already is, a crime generator. What is relatively new is the value of business information. We see a tendency for rising criminal activity in this field. Not only the theft of information, but also the threat of making information public.”1…

    • 11376 Words
    • 46 Pages
    Powerful Essays
  • Powerful Essays

    Essays

    • 8722 Words
    • 35 Pages

    7. Dr. Abha Chandra,Mrs. Vinita Sharma “Analytical Research on Indian Online Banking and Users’ Privacy “Global Journal of Enterprise Information System volume 2- Issue – 1, 2010.…

    • 8722 Words
    • 35 Pages
    Powerful Essays
  • Powerful Essays

    Online Reesrvation

    • 2453 Words
    • 10 Pages

    The fact that online banking is done over the Internet means that safety and security is a big issue (http://www.studymode.com/essays/Thesis-On-Internet-Banking-767450.html).…

    • 2453 Words
    • 10 Pages
    Powerful Essays