Professional Documents
Culture Documents
Assignment Nani
Assignment Nani
0 INTRODUCTION
In this modern world, computers and Internet is no longer an uncommon thing to have in our
life. Most of us are familiar with it, and we all should know about pros and cons about
Internet. The development of an Internet contributes us in many ways, but there are also
people taking granted of Internet into doing crimes such as cybercrime. About 70 % of
commercial crime cases now can be categorised as cybercrime cases.
Security risk is defined as any event or action that could cause a loss of or damage to
computer hardware, software, data, information, or processing capability. Cybercrime is one
of the crimes that is act on computers to steal someone’s information, data, and personal
identity. There are a few types of security risk founded in the scenario.
1
2.1 PHISHING
Phishing messages are designed to trick the recipient into visiting a malicious site or
opening an infected attachment. Based on the scenario given, on December 9, 2020, a
phishing email was sent from a known external entity to two Elara employees. The intruder
then gained access to a limited number of Elara employee email accounts and sent additional
phishing emails from two accounts. Other than that, the company, which provides home-
based health services, suffered an unauthorized computer intrusion in December 2020 after a
series of phishing attacks targeted employees.
2
3.0 SECURITY MEASURE
Security measure are the ways to overcome the computer security risks. Implementation of
security measures is important to avoid or reduce the security risks faced by users and
organizations in using computers and networks. There are a few examples security measures
that can overcome security risks discovered from the scenario.
3.2 FIREWALL
A duplicate of a file, program, or disk that can be used if the original is lost, damaged
or destroyed. Backup copies allow data from Elara’s company to be restored from an
earlier point in time to help the business recover from an unplanned event. Elara can
store the copy of the data on separate medium is critical to protect against primary
data loss or corruption. This additional medium can be as simple as an external drive
or USB stick, or something more substantial, such as a disk storage system, cloud
storage container, or tape drive.
3
4.0 CONCLUSION