Computer security risks is any incident that will cause a damage or loss to computer
measures needed to be taken so that damage or loss on computer can be prevent and also
Scenarios:
(i) A laptop containing the names, identification numbers and credit card information for
84,000 University Putra Malaysia alumni was stolen from the car of a contractor hired to
Based on the scenario, the security risk involve is hardware theft. Hardware theft is the
act of stealing computer equipment. In the scenario, the laptop containing the names,
identification numbers and credit card information for 84,000 University Putra Malaysia
was stolen and hence this also lead to information theft. Information theft happen when
taken are by using real time location system and by applying the physical access
controls. By using the real time location system, we can track the laptop and locate
where the laptop is. The contractor also need to be responsible to take care the laptop
securely as it has confidential information and he should not simply to leave the laptop in
the car.
1
(iv) In 1996, a laptop computer was stolen from an employee of Visa International that
contained 314,000 credit card accounts. The total lost to Visa just for cancelling the
Based on the scenario, this security risk involve is hardware theft. Other than that, the
security risk involve also is information theft. This can be seen when the laptop that
contained 314,000 credit card account was stolen. The hardware theft and information
being stole. The security measures that need to be taken is physical access controls
which is by attaching physical security devices such as cables that can lock the laptop to
a stationary object. The employee also should install software to protect the information
such as the encryption techniques as the information is very confidential so huge loss
can be prevent.
2
(v) A school teacher is instructed by the principal that he should not use his work
computer to access the internet, except for the purpose of obtaining the materials for the
related subjects. The teacher generally abides by the principal’s policy, but the morning
after the World Cup game, he cannot resist going to the official World Cup 2018
Based on the scenario, the security risk involve is unauthorized access and use. The
unauthorized access that has been done is the misuse of computer or network without
permission. This is because the teacher has access something that is not related to
school and disobey the principal rule. The security measures need to be taken is by
raising the human aspect awareness. The school employee should be expose to the
proper handling of computer and information. The school computer also should block all
websites that is not related to school subjects so that they do not have access to surf the
3
(vii) Salmah was employed by the Bukit Bunga Themepark, and one of her tasks was to
print Indoor Games tickets, hand them offer to customers and receive cash for the
tickets. She also printed extra of tickets and just put them into her own pocket without
paying to company. She was found out and taken to court for offence committed.
Based on the scenario, the security risk involve is unauthorized access and use. The
unauthorized access and use that has been done is the use of data for illegal activities.
This can be seen when Salmah printed extra tickets for her own benefit without paying to
her company. The security measures that need to be taken is by raising the human
awareness. This should be done so that all employee will be more responsible and they
will have integrity and more honest in their work. Other than that, actions need to be
taken to the employee that disobey or misuse their work so that the other employee will
Conclusion
computer security risk and threat that brings damage to us. It is important for every each
one of us to be able to identify the computer security risk and how to handle them. This
is to protect us from all cost of damage and loss that could affect our life.
Reference
1. Gary Shelly, Misty Vermaat, Jeffrey Quasney, Susan Sebok & Steven Freund. (2012).
Discovering Computers, Complete: Your Interactive Guide to the Digital World. China: