Writing Assignment: 3.3 Computer Security Risks 3.4 Computer Security Measures
Writing Assignment: 3.3 Computer Security Risks 3.4 Computer Security Measures
WRITING ASSIGNMENT
3.3 COMPUTER SECURITY RISKS
3.4 COMPUTER SECURITY MEASURES
1.0 INTRODUCTION 3
4.0 CONCLUSION 9
References
Attachment 1: TABLE
2
1.0 INTRODUCTION
Security risk is any event or action that could cause a loss of or damage to
computer hardware,software,data,information or processing capability. A computer security
risk is really anything on your computer that may damage or steal your data or allow
someone else to access your computer, without your knowledge or consent. There are a lot
of different things that can create a computer risk, including malware, a general term used
to describe many types of bad software. We commonly think of computer viruses, but, there
are several types of bad software that can create a computer security risk, including viruses,
worms, ransomware, spyware, and Trojan horses. Misconfiguration of computer products as
well as unsafe computing habits also pose risks.
3
a. Risk 1
The first one is information theft. Information theft is the act of stealing personal or
confidential information such as a person’s name,bank account number and company’s
financial data. Identity theft is a specific type of information theft which occurs when
someone steals and uses other’s personal information for a financial gain. This can be
related to the scenario given in the article when Australia and New Zealand logistics
provider Henning Harders has been attacked by ransomware criminals who are threatening
to publish information stolen from the company on the web.
b. Risk 2
The second type of security risk involved is unauthorized use. Unauthorized use
refers to the use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized use can have serious security implications. For example,an employee uses his
office computer to send personal e-mail messages or an employee uses his company’s
landscaping software to a landscape design for his house. This situation can ease the
ransomware criminal to access the company’s data. From the article,the evidence for
unauthorized use is ransomware criminal threatening to publish information stolen from the
company on the web and ransomware criminals Maze have claimed responsibility for the
March 15 attack but not yet published any of the data that might have been taken.
c. Risk 3
Next,malicious code is also the security risk involved which refer to any code that is
intended to cause undesired effects,security breaches or damage to a system. Malicious
code will be activated on a computer when a user opens an infected file,an infected e-mail
attachments,runs an infected program and connects an unprotected computer to a network.
Malicious code can be detected when the files become corrupted or disappear and an
unknown program or files mysteriously appear. Based on the scenario given in the article,the
company “became aware of unusual activity on our systems which appears to be the result
of an organised attack” and include the evidence when the attack on Toll Group saw up to
1000 servers being hit by ransomware,which impacted around 500 corporate applictions and
compromised Active Directory systems serving the company.
4
d. Risk 4
The last type of security risk that involved in the scenario given in the article is
software theft which is the act of stealing software media,intentionally erasing
programs,illegally copying a program or illegally registering a program. Software theft may
be carried out by individuals, groups or, in some cases, organizations who then distribute the
unauthorized software copies to users.This proven in the article when some customer
commercial data may have been accessed.
5
3.0 SECURITY MEASURES
a. Measure 1
6
b. Measure 2
Firewall also used to overcome another risk such as malicious code detect and
protect the data drom any viruses,worms and trojan horse that should be related to the
scenario that the company “became aware of unusual activity on our system which appears
to be the result of an organised attack” and include the evidence which the attack on Toll
Group saw up to 1000 servers being hit by ransomware,which impacted around 500
corporate applictions and compromised Active Directory systems serving the company.
7
c. Measure 3
d. Measure 4
8
e. Measure 5
There are also security measure named anti-spyware that is a type of program
designed to detect and prevent spyware installation. Anti-spyware programs monitor
incoming data programs from email,or websites and stop spyware programs from getting an
access to the computer operating system. Anti-spyware stop spyware programs from getting
an access to the computer operating system such as software theft that should be related to
the scenario in the article when there is some customer commercial data may have been
access.
4.0 CONCLUSION
REFERENCES
9
1. China Business Review,Est 1974.Unauthorized Use and Legal Management. Retrieved
from https://www.chinabusinessreview.com/electronic-chops-unauthorized-use-and-
legal-risk-management-in-china/
2. Edureka!.(2020).What is Computer Security. Retrieved from
https://www.edureka.co/blog/what-is-computer-security/
3. Study.com,(2003-2020).What is Security Risk. Retrieved from
https://study.com/academy/lesson/what-is-a-computer-security-risk-definition-
types.html
4. Techopedia.com.(2017).What is Software Theft. Retrieved from
https://www.techopedia.com/definition/22203/software-theft
10
11