Computer Science 1
Computer Science 1
Computer Science 1
1
2
Table of content
No Content Page
1 Introduction 4
3 Security Measures 6
4 Conclusion 7
5 References 8
3
1.0 Introduction
A computer security risk is something on your computer that will harm or obtain your data or
giving someone access to access your computer, without your permission or consent.There
are many security risk in this world of technology such as malicious code , unauthorized
access and use , hardware theft , software theft and information theft that are blooming up in
this 2019 lately. Example for malicious code is Worm , Trojan and Virus. Next , computer
security risk can result in damage of computer hardware, loss of data, software malfunctions
and poor computing performance.
Apart from that , security measures is the ways to overcome or solving the security risks
ways taken to overcome the security risks based on the given scenario. There are many types
of security measures such as anti-virus, anti-spyware, firewall, physical access control and
human awareness that will be a great tools in solving the problems regarding the security
risks based on each scenario.
4
2.0 Security Risks
Based on given scenario , the security risks that involved is malicious code, information theft
and unauthorized access and use . Firstly , malicious code is a kind of harmful computer code
or web script to create destructive effects by creating a back doors that will lead hackers to
security breaches, information and data theft, and other potential damages to files and
computing systems . This can be said as the phishing emails contain Trojan by antivirus (AV)
that running on customer systems . The malicious code that the org 10 customers received
was in Zip file that contains an executable exe program called “Statements_Jan_2015.exe”
that allow the attackers to gain access to derive all of their customer’s email addresses , data
such as banking information , access to command and control servers or malicious sites to
execute the transaction from the user bank accounts to the malware author bank accounts .
Unauthorized access is refers when someone obtain access to a program, website, server,
service, or other system using someone else's account or other methods such as Trojan-Spy .
It connects to the org 10 customer control servers or website to download additional data or
uploading data such as banking information . Next , the hackers also made the malware to
initiate the transaction from the org 10 customers banks accounts to the hacker accounts.
5
3.0 Security Measures
An internet user should beware of suspicious emails and should not click suspicious links
unless it is from trusted entities by recognizing the common phishing language such as
"Verify your account" . Other than that , user should not click a deceptive links that mimic
legitimate URL addresses from an email as it is frequently use in phishing scams . This is
because legitimate businesses will not send you an email to ask for your login information or
sensitive personal information.
3.2 Anti-Virus
Anti-virus software is a software utility that prevents, detects, and removes viruses, worms,
and other malware from a computer. Most anti-virus programs nowadays has an auto-update
feature that detect malware and virus . User should install an antivirus software such as
Kaspersky Antivirus and must kept up to date its software so it will scan your system to make
sure you haven't downloaded a Trojan, and will automatically scan any program or file you
execute from the mail that you received to ensure its safety . If it contains a malicious code ,
it will automatically delete or remove it from the system . For example , it will remove the
Statements_Jan_2015.exe instantly as it contains Trojan that detected by the antivirus .
3.3 Anti-Spyware
6
4.0 Conclusion
In conclusion , Security risks is the most dangerous threat to all computer and network user
and this should be taken seriously as things might wrong with it . While the Internet has
sophisticatedly revolutionized communications, its advancements come at the price of new
perils. Without any online defense or any security measurements , you leave yourself open to
a myriad of cyber crime such as hacking, information theft, and phishing that will burden
your life . So,users should upgrade or install their security measure to ensure their safety
while surfing or using the internet . User should know the importance of security measure and
awareness about the cyber crime in 2019 . Just imagine what will happen if the world where
the cyber crime rate is low as more people are aware of these things? We would probably be
safety and less worried while using the internet . Lastly , I hope that people in 2019 will be
more aware of security measurements and security risks more deeply and widely .
7
5.0 References
https://www.kaspersky.com/resource-center/threats/trojans
Inc, W. (n.d.). Types of Computer Security Threats and How to Avoid Them. Retrieved from
Webroot:
https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats
https://www.techopedia.com/search?q=trojan horse§ion=terms
Comodo Security Solutions . (n.d). What Is Phishing Scams? Retrieved from Comodo:
https://www.comodo.com/resources/home/how-to-avoid-phishing.php
https://www.veracode.com/security/malicious-code
Yew Kwang Hooi et al . (2016). Computer Science for Matriculation Semester 1. Oxford
Fajar