Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

1.

0 INTRODUCTION

In this modern world, computers and Internet is no longer an uncommon thing to have in our
life. Most of us are familiar with it, and we all should know about pros and cons about
Internet. The development of an Internet contributes us in many ways, but there are also
people taking granted of Internet into doing crimes such as cybercrime. About 70 % of
commercial crime cases now can be categorised as cybercrime cases.

2.0 SECURITY RISK

Security risk is defined as any event or action that could cause a loss of or damage to
computer hardware, software, data, information, or processing capability. Cybercrime is one
of the crimes that is act on computers to steal someone’s information, data, and personal
identity. There are a few types of security risk founded in the scenario.

1
2.1 PHISHING

Phishing messages are designed to trick the recipient into visiting a malicious site or
opening an infected attachment. Based on the scenario given, on December 9, 2020, a
phishing email was sent from a known external entity to two Elara employees. The intruder
then gained access to a limited number of Elara employee email accounts and sent additional
phishing emails from two accounts. Other than that, the company, which provides home-
based health services, suffered an unauthorized computer intrusion in December 2020 after a
series of phishing attacks targeted employees.

2.2 UNAUTHORIZED ACCESS

Unauthorized access refers to the use of a computer or network without permission.


As evidence from the scenario given, the company, which provides home-based health
services, suffered an unauthorized computer intrusion in December 2020 after a series of
phishing attacks targeted employees. And according to Elara Caring, the unauthorized
access lasted for at least five days

2.3 INFORMATION THEFT


Information Theft is the act of stealing personal or confidential information, such as a
person’s name, bank account number, or company’s financial data. Based on the
scenario, Elara Caring is potentially exposed datasets include patient’s name, date of
birth, address, phone number, financial or bank account information, Social Security
number, insurance information and account number, and driver’s license number. A
data breach at US healthcare provider Elara Caring has potentially exposed the
personal details of more than 100,000 elderly patients. The attack resulted in a
potential 100,487 individuals having their data compromised, as reported to the US
Department of Health and Human Services by parent company BW Homecare
Holdings.

2
3.0 SECURITY MEASURE

Security measure are the ways to overcome the computer security risks. Implementation of
security measures is important to avoid or reduce the security risks faced by users and
organizations in using computers and networks. There are a few examples security measures
that can overcome security risks discovered from the scenario.

3.2 FIREWALL

A firewall is a network security system designed to prevent unauthorized access from


another network to a private network. Firewall such as Norton Personal Firewall is a
comprehensive suite of security tools that protect from all sorts of threats such as viruses,
malware, and spyware. With this, it will able to allow or deny individual applications access
to the Internet in Elara’s company and can prevent from unauthorized intrusions from
accessing.

3.3 DATA BACKUP

A duplicate of a file, program, or disk that can be used if the original is lost, damaged
or destroyed. Backup copies allow data from Elara’s company to be restored from an
earlier point in time to help the business recover from an unplanned event. Elara can
store the copy of the data on separate medium is critical to protect against primary
data loss or corruption. This additional medium can be as simple as an external drive
or USB stick, or something more substantial, such as a disk storage system, cloud
storage container, or tape drive.

3.4 HUMAN ASPECT: AWARENESS


Users awareness and knowledge about all the security risks will help users to take
proper measures to prevent and overcome the risks they may face when using
computer and networks. Elara can get a free anti-phishing add-ons will enable her to
spot the signs of malicious website and will alert you about known phishing sites.
Strong passwords are also one of protections against phishing. Developing and
enforcing a strong password, Elara’s accounts may have been compromised without
her knowing, and will prevent her from an attacker from gaining unlimited access.

3
4.0 CONCLUSION

In conclusion, as a computer user we should be aware of using Internet. It is crucial


for us to have security measures in our computers to avoid unwanted things to
happen. By having security measures, we can avoid from being a bait from cyber
criminals trying to steal our personal informations. Other than that, security measure
also safeguarding our valuable information from any unauthorized user. Last but not
least, security measures help business reduce risk of falling victim from sabotage.

You might also like