0% found this document useful (0 votes)
140 views4 pages

Scomp Assignment

This document discusses hardware theft as a computer security risk. It provides an example scenario where a stalker is able to steal a person's newly bought laptop after observing the person's online updates of their location and daily routines. The document identifies hardware theft as the specific computer security risk involved. It then discusses two security measures that could help prevent such theft: physical access control systems like biometric scanning, and raising user awareness of safe computing habits to avoid unintentionally enabling stalking or theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views4 pages

Scomp Assignment

This document discusses hardware theft as a computer security risk. It provides an example scenario where a stalker is able to steal a person's newly bought laptop after observing the person's online updates of their location and daily routines. The document identifies hardware theft as the specific computer security risk involved. It then discusses two security measures that could help prevent such theft: physical access control systems like biometric scanning, and raising user awareness of safe computing habits to avoid unintentionally enabling stalking or theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

KOLEJ MATRIKULASI NEGERI SEMBILAN

COMPUTER SCIENCE UNIT

SESSION 2021/2022

SC015

COMPUTER SCIENCE

TOPIC :

HARDWARE THEFT

NAME : TASHNEEM BINTI ZAINAL ABIDIN

MATRIC NUMBER : MS2012171654

PRACTICUM : F2P1

LECTURER’S NAME : MADAM ANIE HASLIZA

SUBMISSION DATE : 8th OCTOBER 2021


“ Kamil always updates his live check-in locations and daily routines on
Facebook. Without him knowing, there is a stalker who keeps on following him
wherever he goes. One day, just after Kamil bought a new laptop and leave it in
his room, that stalker broke in the room and stole the newly-bought laptop.”
INRRIDUCTION
https://study.com/academy/lesson/what-is-a-computer-security-risk-definition-types.html
https://cybersafety2014.wordpress.com/2014/09/11/what-are-computer-security-risks-and-
what-are-the-types-of-cybercrime-perpetrators/
https://www.computerhope.com/jargon/c/computer-security.htm
https://www.reference.com/world-view/hardware-theft-dd36f40815cdfc39

A computer security risk is an event or action that could cause damage hardware or
software or steal your data or allow someone else to access your computer, without your
knowledge or consent. It could result from unpatched software, misconfigured software or
hardware, and bad habits. We all have and use electronic devices that we cherish because
they are so useful yet so expensive. Thus, it is important that those devices stay safe by
protecting your data and confidential information and networks. We share personal
information on the Internet and perform personal matters involving sharing personal details
or money transactions. Misconfiguration of computer products as well as unsafe computing habits
also pose risks. While, computer security measures are the protection that can reduce the risk
of a problem occurring due to computer risk. Some of the security measures are data backup,
cryptography, antivirus, antispyware, firewall, physical access control and lastly in terms
human aspect, awareness. These security measures can be as a precaution against theft such
as information theft, sabotage, failure or any possible danger. It is important for your
computer’s overall health and also having a proper security measure helps prevent viruses
and malware, which allows programs run quicker and smoother. The suitable security
measures based on computer security risk above,hardware theft will be explained more in this
assignment
QUES 1 2 3 ( HARDWARE THEFT)

In Kamal’s situation, the type of computer security risk related to the given
scenario is hardware theft. Hardware theft defined as the act of stealing computer equipment
(physical computer parts). For example, laptop, the system unit, modem or keyboard.
Nowadays, the popularity of smartphones and tablets has made hardware theft a common
crime in major cities. Computer equipment is expensive, and enterprise hardware is
especially costly. Many of the most expensive devices are small, and improper security can
make businesses tempting targets for thieves especially laptop. Based on the scenario given,
Kamal always updates his location and his routine in the social media. Without him knowing,
there is stalker that keep an eye on him or following him everytime he update on his social
media. One day, when he just bought his new laptop and he left it in his room, the stalker
took the opportunity to break into his house and immediately stole the newly-bought laptop.
So Kamal lost his new laptop that costs hundreds or thousands of dollars in just a few hours.
In this case, thieves can often disable software designed to locate a phone if it has been
stolen, so many operators now blacklist phones that are reported as stolen. Despite these
efforts, stolen phones are often sold online.

There are two security measures that might help to overcome hardware theft, Physical
Access Control and Human Aspect: Awareness, First, what is Physical Access Control? It is a
system that determines who is allowed to enter or exit, where they are allowed to exit or
enter, and also when they are allowed to enter or exit physically. In this case, Kamal can use
the biometric devices. This biometric devices requires identify authentication by scaning a
person’s unique physical characteristic before entering hardware located area.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy