Final Written Assignment Scomp Anisyam k05
Final Written Assignment Scomp Anisyam k05
COLLEGE
COMPUTER SCIENCE
SEMESTER 1
SESSION 2023/2024
WRITTEN ASSIGNMENT
1
TABLE OF CONTENT
NO CONTENT PAGE
PART A (i)
OF EACH RISK
PART A (ii)
PART B
4. CONCLUSION 10
5. REFERENCES 11
2
COMPUTER SECURITY RISK
INTRODUCTION :
https://www.edureka.co/blog/what-is-computer-security/#ComputerSecurityThreats)
3
Next, data theft or information theft is the act of stealing digital information stored on
computers, servers, or electronic devices to obtain confidential information or compromise
privacy. The data stolen can be anything from bank account information, online passwords,
passport numbers, driver's license numbers, social security numbers, medical records,
online subscriptions, and so on. Once an unauthorized person has access to personal or
financial information, they can delete, alter, or prevent access to it without the owner’s
permission.Data theft usually occurs because malicious actors want to sell the information
or use it for identity theft. If data thieves steal enough information, they can use it to gain
access to secure accounts, set up credit cards using the victim’s name, or otherwise use
the victim’s identity to benefit themselves. Data theft was once primarily a problem for
businesses and organizations but, unfortunately, is now a growing problem for
individuals.While the term refers to 'theft', data theft doesn't literally mean taking
information away or removing it from the victim. Instead, when data theft occurs, the
attacker simply copies or duplicates information for their own use.The terms 'data breach'
and 'data leak' can be used interchangeably when discussing data theft.A data leak occurs
when sensitive data is accidentally exposed, either on the internet or through lost hard
drives or devices. This enables cybercriminals to gain unauthorized access to sensitive
data without effort on their part.By contrast, a data breach refers to intentional
cyberattacks.(What is Information Theft ? Retrieved from
https://www.kaspersky.com/resource-center/threats/data-theft)
4
Last but not least, Unauthorized access is the use of a computer or network without
permission.Unauthorized use is the use of a computer or its data for unapproved or
possibly illegal activitiy. Guessing passwords is a common entry vector for unauthorized
access. Manual password guessing is done using social engineering, phishing, or by
researching a person to come up with information that could be the password. In scaled
attacks, software is used to automate the guessing of access information, such as user
names, passwords, and personal identification numbers (PIN). Next,Cybercriminals often
gain unauthorized access by taking advantage of human vulnerabilities, convincing people
to hand over credentials or sensitive data. These attacks, known as social engineering,
often involve some form of psychological manipulation and utilize malicious links in email,
pop-ups on websites, or text messages. Common social engineering tactics used to gain
unauthorized access include phishing, smishing, spear phishing, ransomware, and
impersonation. (What is Unauthorized Access and Use ? Retrieved from
https://digiten.weebly.com/unauthorized-access-and-use.html)
5
COMPUTER SECURITY MEASURE
INTRODUCTION :
Computer security measures refer to the set of policies and procedures established
to protect computer networks, systems, and data from a wide range of potential threats.
These threats can include viruses, unauthorized access attempts, data breaches, and
various forms of cyber attacks. The ultimate goal of these measures is to ensure the
confidentiality, integrity, and accessibility of digital information. To achieve this objective,
it is imperative to implement robust and effective computer security mechanisms. These
mechanisms play a crucial role in safeguarding sensitive information and maintaining the
overall security of computerized systems. (Kelley, K. (2023). What is Cybersecurity and
Why It is Important? Simplilearn.com. https://www.simplilearn.com/tutorials/cyber-
security-tutorial/what-is-cyber-security)
First, data backup is a duplication of a file,program,or disk that can be used if the
original is lost,damaged,or destroyed.In the case of a system failure or the discovery of
corrupted files,we restore the files by copying the backed up files to their original location
on the computer. The modern alternative to tape backup is cloud storage. With this
solution, you subscribe to a specific storage capacity in the cloud vendor's or service
provider's data center. You do not need any hardware as you do with tape drives (unless
you rely on private cloud storage), but you do need an internet connection to send
backups to the cloud. Your vendor may have ways to eliminate the problems with
uploading large amounts of data by offering physical data shipping or an initial seeding
program.(What is Data Backup ? Definition of Data Backup ,retrieved from
https://digiten.weebly.com/system-failure.html)
6
Next, cryptography is the process of hiding or coding information so that only the person
a message was intended for can read it.The art of cryptography has been used to code
messages for thousands of years and continues to be used in bank cards,computer
passwords,and ecommerce. Modern cryptography techniques include algorithms and
ciphers that enable the encryption and decryption of information, such as 128-bit and 256-
bit encryption keys. Modern ciphers, such as the Advanced Encryption Standard (AES),
are considered virtually unbreakable. A common cryptography definition is the practice of
coding information to ensure only the person that a message was written for can read and
process the information. This cybersecurity practice, also known as cryptology, combines
various disciplines like computer science, engineering, and mathematics to create
complex codes that hide the true meaning of a message. (What is Cryptography?
Definition of Cryptography ,retrieved from
https://www.fortinet.com/resources/cyberglossary/what-is-cryptography)
Last but not least, firewall is a computer network security system that restricts
internet traffic in to,out of, or within a private network.This software functions by selectively
blocking or allowing data packets. It is typically intended to help prevent malicious activity
and to prevent anyone inside or outside a private network from engaging in unauthorized
web activities. Firewalls are typically used to gate the borders of a private network or its
host devices. As such, firewalls are one security tool in the broader category of user access
control. These barriers are typically set up in two locations on dedicated computers on the
network or the user computers and other endpoints themselves (hosts). A firewall decides
which network traffic is allowed to pass through and which traffic is deemed dangerous.
Essentially, it works by filtering out the good from the bad, or the trusted from the untrusted.
(What is Firewall ? Definition of Firewall ,retrieved from
https://www.kaspersky.com/resource-center/definitions/firewall)
7
ARTICLE 1:
8
ARTICLE 2:
15 men armed with baseball bats rob computer store in Cheras | Free Malaysia Today (FMT)
The article details an alarming armed robbery incident that occurred at a computer
store in Bandar Damai Perdana, Cheras. In this security threat, 15 individuals, armed with
baseball bats, forcibly entered the premises, violently assaulted the security guard, and
made off with computer equipment valued at RM70,000. The primary cause of this incident
lies in the criminal intent of the 15 individuals, driven by the goal of stealing valuable
computer equipment, underlining economic motives and their willingness to employ
violence. The impact of this armed robbery is substantial, encompassing a significant
financial loss for the computer store and physical harm to the security guard. Beyond these
immediate consequences, such incidents contribute to community fear and insecurity. To
mitigate and prevent similar threats in the future, suggested measures include enhanced
security measures such as surveillance systems and security personnel, community
vigilance through prompt reporting of suspicious activities, close collaboration with law
enforcement for investigation, and the establishment of crime prevention programs aimed
at enhancing safety within the community and among businesses.
9
CONCLUSION:
The two articles highlight distinct but critical security threats faced in Malaysia and
Southeast Asia. The first article emphasizes the alarming surge in phishing attacks, with
cybercriminals targeting individuals and organizations, leading to significant financial and
data security risks. The second article reports an armed robbery at a computer store,
underlining the physical threat to individuals and businesses. In both cases, proactive
security measures, including education, technology, and collaboration with law
enforcement, are essential to mitigate these threats. These incidents serve as a reminder
of the diverse security challenges faced in the region and the need for a multifaceted
approach to safeguard individuals, businesses, and communities from both digital and
physical threats.
10
REFERENCES:
1. Sadiq, A., Anwar, M., Butt, R. A., Masud, F., Shahzad, M. K., Naseem, S., &
Younas, M. (2021, October 21). A review of phishing attacks and
countermeasures for Internet of Things-based smart business applications in
Industry 4.0. Human Behavior & Emerging Technologies.
https://doi.org/10.1002/hbe2.301
2. Serwadda, A., Phoha, V. V., Wang, Z., Kumar, R., & Shukla, D. (2016).
14,1-25.https://doi.org/10.1145/2898353
3. Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works:
User strategies for combating phishing attacks. International Journal
of Human-Computer Studies,82,69-82.
https://doi.org/10.1016/j.ijhcs.2015.05.005
11
Name: Mohamad Anisyam bin Syamsuddin Matric Number: MS2315113198 Tutorial: K05
Format Writing without Writing follows Writing follows the Writing follows the
following the the format given format given format given
format given. minimally. partially. totally. 1
Bibliography Not state Refers three Refers three Refers three or more
(APA Styles) any reference reference reference sources
bibliography. sources without sources according to APA 1
following and minimally citation format.
APA following APA
citation citation format.
format. Total
Lampiran/Attachment
PB/PTP
STUDENT’S DECLARATION
MINISTRY OF EDUCATION MALAYSIA MATRICULATION PROGRAMME
Student’s Declaration
I declare that this task is my own work except for the citations and summaries of which I acknowledged the source.
1
PB/MTP
MAKLUM BALAS TUGASAN PELAJAR
PROGRAM MATRIKULASI KEMENTERIAN PENDIDIKAN
MALAYSIA
CONTINUOUS ASSESSMENT FEEDBACK
MINISTRY OF EDUCATION MALAYSIA MATRICULATION PROGRAMME
Tugasan / Task
Perincian / Details
Ujian Amali/ Practical
Tugasan/ Assignment Ujian Amali/ Practical Test
Test
Kekuatan attribut/
Attribute’s strength
Lain-lain/ Others
Tarikh/ Date
Pengesahan Pelajar/ Student’s confirmation
Saya mengesahkan bahawa maklum balas yang diberikan oleh pensyarah telah saya fahami.
I declare that I understand the feedback given by the lecturer.
Catatan (tarikh
perjumpaan
susulan, jika perlu)/
Note (follow-up
session if
necessary)
Tandatangan
Pelajar/ Student’s
Signature
Tarikh/ Date
Nota: Borang maklum balas ini perlu diserahkan kepada pelajar pada awal semester. Pelajar dikehendaki menyerahkan borang maklum balas ini kepada
pensyarah setiap kali selesai melaksanakan setiap tugasan penilaian berterusan.