Sie sind auf Seite 1von 8

Computer Science 1 (SC015)

Computer Ethics And Security

Name : Muhammad Mirza Bin Noradzli


Matric Number : MS1918124655
Lecturer : Asmalinda Binti Adnan
Class : F4T5

1
2
Table of content

No Content Page

1 Introduction 4

2 Computer Security Risks 5

3 Security Measures 6

4 Conclusion 7

5 References 8

3
1.0 Introduction

A computer security risk is something on your computer that will harm or obtain your data or
giving someone access to access your computer, without your permission or consent.There
are many security risk in this world of technology such as malicious code , unauthorized
access and use , hardware theft , software theft and information theft that are blooming up in
this 2019 lately. Example for malicious code is Worm , Trojan and Virus. Next , computer
security risk can result in damage of computer hardware, loss of data, software malfunctions
and poor computing performance.

Apart from that , security measures is the ways to overcome or solving the security risks
ways taken to overcome the security risks based on the given scenario. There are many types
of security measures such as anti-virus, anti-spyware, firewall, physical access control and
human awareness that will be a great tools in solving the problems regarding the security
risks based on each scenario.

4
2.0 Security Risks

2.1 Malicious code

Based on given scenario , the security risks that involved is malicious code, information theft
and unauthorized access and use . Firstly , malicious code is a kind of harmful computer code
or web script to create destructive effects by creating a back doors that will lead hackers to
security breaches, information and data theft, and other potential damages to files and
computing systems . This can be said as the phishing emails contain Trojan by antivirus (AV)
that running on customer systems . The malicious code that the org 10 customers received
was in Zip file that contains an executable exe program called “Statements_Jan_2015.exe”
that allow the attackers to gain access to derive all of their customer’s email addresses , data
such as banking information , access to command and control servers or malicious sites to
execute the transaction from the user bank accounts to the malware author bank accounts .

2.2 Information Theft

Information theft is a crime of obtaining someone personal , bank , financial information of a


person for the sole purpose of gaining money in this scenario . This can be said as Org 10
customers data such as banking and login credentials information were stolen by using
Trojan-Spy and Trojan-Banker from the Zip file (malicious code) that the org 10 customer
download as the malware gained the access on the infected machines.

2.3 Unauthorized access and use

Unauthorized access is refers when someone obtain access to a program, website, server,
service, or other system using someone else's account or other methods such as Trojan-Spy .
It connects to the org 10 customer control servers or website to download additional data or
uploading data such as banking information . Next , the hackers also made the malware to
initiate the transaction from the org 10 customers banks accounts to the hacker accounts.

5
3.0 Security Measures

3.1 Human Awareness

An internet user should beware of suspicious emails and should not click suspicious links
unless it is from trusted entities by recognizing the common phishing language such as
"Verify your account" . Other than that , user should not click a deceptive links that mimic
legitimate URL addresses from an email as it is frequently use in phishing scams . This is
because legitimate businesses will not send you an email to ask for your login information or
sensitive personal information.

3.2 Anti-Virus
Anti-virus software is a software utility that prevents, detects, and removes viruses, worms,
and other malware from a computer. Most anti-virus programs nowadays has an auto-update
feature that detect malware and virus . User should install an antivirus software such as
Kaspersky Antivirus and must kept up to date its software so it will scan your system to make
sure you haven't downloaded a Trojan, and will automatically scan any program or file you
execute from the mail that you received to ensure its safety . If it contains a malicious code ,
it will automatically delete or remove it from the system . For example , it will remove the
Statements_Jan_2015.exe instantly as it contains Trojan that detected by the antivirus .

3.3 Anti-Spyware

Anti-spyware is a type of software that is made up to detect and elimininate a spyware


programs in a computer . User can download an anti-spyware such as Norton-Antispyware .
Norton-Antispyware software alerts users to the existence of spyware and then gives them the
choice of quarantining or removing the offending files , directories and registry keys affected
by the spyware which was happened for Org 10 customers as their data was getting stolen by
the hackers using spyware like Trojan . Other than that most good spyware removers will
provide you with detailed information about the spyware it finds . This information will
include the spyware's name, its origin, and what it was made to do. You can use this
information to know where it was came from and what you should do after downloading
something on the internet .

6
4.0 Conclusion

In conclusion , Security risks is the most dangerous threat to all computer and network user
and this should be taken seriously as things might wrong with it . While the Internet has
sophisticatedly revolutionized communications, its advancements come at the price of new
perils. Without any online defense or any security measurements , you leave yourself open to
a myriad of cyber crime such as hacking, information theft, and phishing that will burden
your life . So,users should upgrade or install their security measure to ensure their safety
while surfing or using the internet . User should know the importance of security measure and
awareness about the cyber crime in 2019 . Just imagine what will happen if the world where
the cyber crime rate is low as more people are aware of these things? We would probably be
safety and less worried while using the internet . Lastly , I hope that people in 2019 will be
more aware of security measurements and security risks more deeply and widely .

7
5.0 References

Kaspersky. (n.d.). What is a Trojan Virus? Retrieved from Kaspersky:

https://www.kaspersky.com/resource-center/threats/trojans

Inc, W. (n.d.). Types of Computer Security Threats and How to Avoid Them. Retrieved from
Webroot:

https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats

Techopedia . (12January2015).Trojan Horse. Retrived from:

https://www.techopedia.com/search?q=trojan horse&section=terms

Comodo Security Solutions . (n.d). What Is Phishing Scams? Retrieved from Comodo:

https://www.comodo.com/resources/home/how-to-avoid-phishing.php

Veracode . (n.d) . Malicious Code. Retrieved from:

https://www.veracode.com/security/malicious-code

Yew Kwang Hooi et al . (2016). Computer Science for Matriculation Semester 1. Oxford
Fajar

Das könnte Ihnen auch gefallen