Risky Situations
Note three types of sensitive information involved with each situation. Then, note three ways each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end of the table.
Situation 1 – Online Banking System
Information Affected
Potential Harm (Risk)
Likely Finding in Risk Analysis Report
Customer details
Unauthorized access
Terminal unauthorized access to customer account information and details.
Alteration of customer details
Hackers gained unauthorized access and altered customer details and information
Copying of customer ...