Home » Downloads » IT Security and Risk Management

IT Security and Risk Management

IT Security and Risk Management
  • List three types of sensitive information involved with each situation.
  • Identify three ways each information item could be misused or harmed.
  • Answer the questions at the end of the table.

 

 

 

 

……………..Answer Preview…………..

 

 

Risky Situations

 

Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the                                                .

 

Situation 1 – Online Banking System
Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report
Customer information Copying of customer information Illegal access to customer information
Gaining illegal access to account Terminal illegal access can be granted to account particulars
Customer information can be modified. Customer information was changed
Account details Mistakes Accidental changing of customer information
Hacking Illegal access of the customer information
Transaction details Scam Access and modifying of deal information for a higher malicious goal

 

× Lets chat on whatsapp?