Professional Documents
Culture Documents
Risk Assessment
Risk Assessment
Risk Assessment
I. AUDIT
LIST ALL PARTICIPANTS INCLUDING ROLE IN THE RISK ASSESSMENT (e.g. system owner, system custodian etc.)
Tiktok developer – they are the one who create the challenge in the tiktok also the creator of it. They connect the creators and communities. They are the
possible Suspect if there is a risk discovered in tiktok.
TIktok user – they are the one who use it, who show and share their passion and creative expression though their videos. They are the possible victim if there
is a risk discovered in tiktok.
DESCRIBE HOW USERS ACCESS THE SYSTEM AND THEIR INTENDED USE THE SYSTEM
Users can access and edit most of your profile information by signing into tiktok. So you must have the account, Create first your tiktok account and you can
now access in the tiktok world. You can now follow other users and watch their videos too. They tended to use tiktok for entertainment, to avoid boredom
strikes.
Page 1 of 3
II. RISK ASSESSMENT
WHAT ARE THE IDENTIFIED THREAT SOURCE AND VULNERABILITY?
Based on my research, tiktok is vulnerable to XSS attacks, a type of attack in which malicious scripts are injected into otherwise benign and trusted websites. It
is also subject to Cybersecurity threat and also a threat to national security.
Severe SMS security threat, it could trick any user on the tiktok network, bad actors can use social media to distribute malicious activity, because the usage is
so high, it is an easy gate to penetrate an asset.
By manipulating an option for a user to SMS themselves a link to the app, an attacker could send a different link to a different user.
Hardware Fault / Software Fault / Human Error / Intentional Outside Error / Intentional Insider Others:
EXISTING CONTROLS
The Department of Defense advised military personnel to remove the Chinese-owned social media application from government-issued and personal
smartphones to avoid the cybersecurity threats.
RISK RATING
A. Consequence
B. Likelihood
C. Risk Rating
RECOMMENDED CONTROLS
Page 2 of 3
Recommended controls or alternative options for reducing risk
Secure your account and never upload a video that shows and reveal your body, it might be used against you. And if it is okay, don’t use the invisible challenge
and reveal your body because the developer can see you and that cause a big trouble if they spread it to the public.
RECOMMENDATIONS
Use the other filter that is safe, Do not make a video that is almost show your body to gain popularity, it might give shame on you.
SUMMARY
What further
What are the Who might be harmed What are you already Action by Action by Done
action is
hazards/risk? and how? doing? whom? When? [mm/dd/yyyy
necessary?
Cybersecurity The users and its gadgets Limit the use of tiktok or Know what is safe By the user When using tiktok 4/8/2020
threats delete the tiktok app and use it. Don’t be app
National security Users and gadgets Limit the information that Delete the filter that By the user When using tiktok 4/8/2020
you give on tiktok. is unsafe. app
Page 3 of 3