Student Name
University
Abstract
James works for a bank, and he spends most of his attending to bank clients and travelling. He always carries with him a laptop that contains confidential bank information. The Operating System of the laptop was last updated in May 2011. Some of the programs James uses are MS word 2007, MS Access and MS Excel. James’ computer is, however, not well secured. It does not have a firewall or an antivirus. In addition, the data in the laptop are not encrypted. Severally, James uses his laptop in a cyber café, and while travelling, he sometimes leaves it in his car un-attended. This paper will present an analysis of possible security threats that may affect James’s laptop. Possible measures to prevent any attack will also be presented.
Introduction
There are several sources of computer threats. According to Fleegar (2007), the sources these threats could either be internal or external. The threats circumvent computers security without prior authorization by rightful user. Internal security risks mainly arise from viruses and physical compromise of storage system (Gasser, 2008) e.g. damaged hard disk. External security risks are mainly from a third person e.g. hacker or a thief. There are mainly three aspects of information that can be compromised. These are Confidentiality, integrity and Availability. These aspects have been discussed below with respect to aim of security, possible attacks and their sources and counter attack measures that should be employed.
Confidentiality
Aim of security: To prevent un-authorized disclosure of information from a computer (Ding, 2011)
Possible attacks: Reading, copying and editing information
Possible sources of attacks: cyber café hackers, criminals e.g. robbers, polymorphic viruses (Gollmann, 2008)
Counter attacks: Documents should have a password, a firewall should be used to bar hackers, user account should have a password or a screen lock and data should be
References: Amoroso, A (2009). Fundamentals of Computer Security. New York: Harcourt Brace Byron, E Dave, C.A. (2007). Security in Computing. New Jersey: Prentice-Hall Ding, C Fleeger, C.P. (2007). Security in Computing. New Jersey: Prentice-Hall Gasser, M Gollmann, D. (2008). Computer Security. London: Oxford UP James, J.D John, M. (2008). Computer security. New York: Nerd Press Joseph, A Mark, C. (2009). Firewalls. Chicago: Chicago UP Martin, A (2009) Mary, K. (2011). Computer security London: Oxford UP Millman, D Park, J.S. (2010). Security in a Client/Server Environment. New Jersey: Wiley & Sons Robert, P Van, N. (2006). Availability security. Hong Kong: HCUST Young, E