Scomp Assignment
Scomp Assignment
SESSION 2021/2022
SC015
COMPUTER SCIENCE
TOPIC :
HARDWARE THEFT
PRACTICUM : F2P1
A computer security risk is an event or action that could cause damage hardware or
software or steal your data or allow someone else to access your computer, without your
knowledge or consent. It could result from unpatched software, misconfigured software or
hardware, and bad habits. We all have and use electronic devices that we cherish because
they are so useful yet so expensive. Thus, it is important that those devices stay safe by
protecting your data and confidential information and networks. We share personal
information on the Internet and perform personal matters involving sharing personal details
or money transactions. Misconfiguration of computer products as well as unsafe computing habits
also pose risks. While, computer security measures are the protection that can reduce the risk
of a problem occurring due to computer risk. Some of the security measures are data backup,
cryptography, antivirus, antispyware, firewall, physical access control and lastly in terms
human aspect, awareness. These security measures can be as a precaution against theft such
as information theft, sabotage, failure or any possible danger. It is important for your
computer’s overall health and also having a proper security measure helps prevent viruses
and malware, which allows programs run quicker and smoother. The suitable security
measures based on computer security risk above,hardware theft will be explained more in this
assignment
QUES 1 2 3 ( HARDWARE THEFT)
In Kamal’s situation, the type of computer security risk related to the given
scenario is hardware theft. Hardware theft defined as the act of stealing computer equipment
(physical computer parts). For example, laptop, the system unit, modem or keyboard.
Nowadays, the popularity of smartphones and tablets has made hardware theft a common
crime in major cities. Computer equipment is expensive, and enterprise hardware is
especially costly. Many of the most expensive devices are small, and improper security can
make businesses tempting targets for thieves especially laptop. Based on the scenario given,
Kamal always updates his location and his routine in the social media. Without him knowing,
there is stalker that keep an eye on him or following him everytime he update on his social
media. One day, when he just bought his new laptop and he left it in his room, the stalker
took the opportunity to break into his house and immediately stole the newly-bought laptop.
So Kamal lost his new laptop that costs hundreds or thousands of dollars in just a few hours.
In this case, thieves can often disable software designed to locate a phone if it has been
stolen, so many operators now blacklist phones that are reported as stolen. Despite these
efforts, stolen phones are often sold online.
There are two security measures that might help to overcome hardware theft, Physical
Access Control and Human Aspect: Awareness, First, what is Physical Access Control? It is a
system that determines who is allowed to enter or exit, where they are allowed to exit or
enter, and also when they are allowed to enter or exit physically. In this case, Kamal can use
the biometric devices. This biometric devices requires identify authentication by scaning a
person’s unique physical characteristic before entering hardware located area.