IT Security and Risk Management
- List three types of sensitive information involved with each situation.
- Identify three ways each information item could be misused or harmed.
- Answer the questions at the end of the table.
……………..Answer Preview…………..
Risky Situations
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the .
Situation 1 – Online Banking System | ||
Information Affected | Potential Harm (Risk) | Likely Finding in Risk Analysis Report |
Customer information | Copying of customer information | Illegal access to customer information |
Gaining illegal access to account | Terminal illegal access can be granted to account particulars | |
Customer information can be modified. | Customer information was changed | |
Account details | Mistakes | Accidental changing of customer information |
Hacking | Illegal access of the customer information | |
Transaction details | Scam | Access and modifying of deal information for a higher malicious goal |