Anda di halaman 1dari 4

Introduction

Computer security risks is any incident that will cause a damage or loss to computer

hardware, software, data, information or processing capability. This is why security

measures needed to be taken so that damage or loss on computer can be prevent and also

cybercrime can be avoided.

Scenarios:

(i) A laptop containing the names, identification numbers and credit card information for

84,000 University Putra Malaysia alumni was stolen from the car of a contractor hired to

develop software for the University.

Based on the scenario, the security risk involve is hardware theft. Hardware theft is the

act of stealing computer equipment. In the scenario, the laptop containing the names,

identification numbers and credit card information for 84,000 University Putra Malaysia

was stolen and hence this also lead to information theft. Information theft happen when

someone steals personal or confidential information. The security measures need to be

taken are by using real time location system and by applying the physical access

controls. By using the real time location system, we can track the laptop and locate

where the laptop is. The contractor also need to be responsible to take care the laptop

securely as it has confidential information and he should not simply to leave the laptop in

the car.

1
(iv) In 1996, a laptop computer was stolen from an employee of Visa International that

contained 314,000 credit card accounts. The total lost to Visa just for cancelling the

numbers and replacing the cards was RM6 million.

Based on the scenario, this security risk involve is hardware theft. Other than that, the

security risk involve also is information theft. This can be seen when the laptop that

contained 314,000 credit card account was stolen. The hardware theft and information

theft is involve because there is a computer equipment and confidential information is

being stole. The security measures that need to be taken is physical access controls

which is by attaching physical security devices such as cables that can lock the laptop to

a stationary object. The employee also should install software to protect the information

such as the encryption techniques as the information is very confidential so huge loss

can be prevent.

2
(v) A school teacher is instructed by the principal that he should not use his work

computer to access the internet, except for the purpose of obtaining the materials for the

related subjects. The teacher generally abides by the principal’s policy, but the morning

after the World Cup game, he cannot resist going to the official World Cup 2018

webpage to read about the South Korea win against Germany.

Based on the scenario, the security risk involve is unauthorized access and use. The

unauthorized access that has been done is the misuse of computer or network without

permission. This is because the teacher has access something that is not related to

school and disobey the principal rule. The security measures need to be taken is by

raising the human aspect awareness. The school employee should be expose to the

proper handling of computer and information. The school computer also should block all

websites that is not related to school subjects so that they do not have access to surf the

unrelated school work.

3
(vii) Salmah was employed by the Bukit Bunga Themepark, and one of her tasks was to

print Indoor Games tickets, hand them offer to customers and receive cash for the

tickets. She also printed extra of tickets and just put them into her own pocket without

paying to company. She was found out and taken to court for offence committed.

Based on the scenario, the security risk involve is unauthorized access and use. The

unauthorized access and use that has been done is the use of data for illegal activities.

This can be seen when Salmah printed extra tickets for her own benefit without paying to

her company. The security measures that need to be taken is by raising the human

awareness. This should be done so that all employee will be more responsible and they

will have integrity and more honest in their work. Other than that, actions need to be

taken to the employee that disobey or misuse their work so that the other employee will

follow all the rules and more risk can be prevent.

Conclusion

In conclusion, in this era of globalization, we are more prone to expose to many

computer security risk and threat that brings damage to us. It is important for every each

one of us to be able to identify the computer security risk and how to handle them. This

is to protect us from all cost of damage and loss that could affect our life.

Reference

1. Gary Shelly, Misty Vermaat, Jeffrey Quasney, Susan Sebok & Steven Freund. (2012).

Discovering Computers, Complete: Your Interactive Guide to the Digital World. China:

China Translation & Printing Services Limited.

Anda mungkin juga menyukai