Preview

Risks of Macros

Satisfactory Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risks of Macros
The Risk of Macros

A primary security risk in using macros is that macros can be programmed to act like viruses and delete files and cause a lot of damage to your system. Depending on the service pack installed you may get an alert every time you open a file that contains a macro. It would be a good security practice to never enable macros unless you are completely confident and aware of the source. Any unsigned macros are automatically disabled. Any macros that are unknown or downloaded, the Microsoft security system will think it has a virus.

A security service ran by Carnegie Mellon in 1999 alerted Microsoft Office of a major security oversight. It was found from a macros virus people were using in Microsoft. “Since the 1999 incident Microsoft has made provisions to lower the risk of anymore problems. So needless to say it is important that the user be educated in the precautions that Microsoft has taken in keeping the user computer safe. Educating the user will not only let the user know why these security measures are needed. Like in Microsoft 2007 and newer the extension in the file name is added security for the user and the Microsoft program to identify trusted macro enabled file ("Excel Macro Security", 2012). Also the user will know not to enabled or disable certain security settings” (rns2undone)

By locking cells from right-clicking the format cells in the column desired and then finalizing that move from going to the review tab and clicking Protect Sheet,you can protect your worksheet.You can enter a password, functions will be ‘greyed’,and nothing can be modified.

Risk Using Macro in Excel - Research Paper - Rns2Undone www.studymode.com › Home › Religion & Spirituality‎

Richard L. Meade rlmeade@cox.net Eastern Standard Time

You May Also Find These Documents Helpful

  • Satisfactory Essays

    One common vulnerability is the lack of or outdated antivirus software. We get the popup alerts and click it away, because that alert is so annoying. But what must be realized is that annoying popup is a warning alert telling the user that the local workstation or network has a weakness that needs to be addressed.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Open the excel file which is password protected and goto Macro's (I am using Office 2007 so the menu's maybe different View >> Macros). Click on "Record Macro >> OK" and then click on "Stop Recording" from the same menu. Now goto "View Macros", you will find a Macro with a default name E.g. Macro1 - Select the macro name and click on Edit. Now a Visual Basic Editor opens up. Re-place the default code and Paste the below code.…

    • 1023 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    2. Another SMTP Server security threat is denial-of-service also known as DoS. This attack will shut off access to your site. The attacker will increase traffic on your site. The increased traffic will cause your site to become unresponsive and shut down. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Reliable and accessibility is the largest challenge to managing data, text, and documents. If permissions are not set up properly then anyone ca n make changes to a document which can cause a problem for whom ever wishes to use the data. If there are several copies of the same file it to can cause…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Excel: Control Key and Cell

    • 2429 Words
    • 10 Pages

    To divide the value of one cell by some other number, you'd use the _________ symbol…

    • 2429 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    As our society realize more and more on technology like computers and smart phones to conduct every day things such as banking, work, school, and staying connected with family and friends, our personal information has become more vulnerable to attack. Before computers, if someone wants to steal your personal information they would need to break in to your house, work and car to try and get your information. Now everything about us are stored right on our computers from banking information, to medical information. Some of the most common forms of attack on Microsoft system are Trojan horse, backdoor, denial of service, robot/intermediary process, unprotected…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    EAS230Syllabus

    • 1748 Words
    • 8 Pages

    Philosophy: Lectures, 2 exams, and 9 project (lab) assignments form the basis for this course. The projects will be extensive, and will require that you attend lab sections so that you can get help from the TAs. Class attendance is mandatory. Speak up in class. Emails, while convenient, do not shift responsibility for handling a problem to the recipient. There's no substitute for face time. Emails which ask questions that are better asked in class, will be actively ignored. This is the University at Buffalo, not the University of Phoenix.…

    • 1748 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Even though Macros do it yourself software is ranked as one of Microsoft’s most useful tools to use. Based on the article by Lenning (2005) the primary security risk for users to know using macros is that many of these sites could have many different types of viruses. It is recommended that one should use caution when opening a new document. You should only open and used a trusted because some files can be corrupted and then they will spread viruses to your computer and most of the time you do not know where they come from. Depending on which version that you are going to use you will get a warning every time for a file that contains a macro. This is done because many times macros can be programmed to act like a virus. Before even considering opening a marcro site one has to remember that it can be dangerous to their computer. Because these viruses that pretend to be a marco they can get into your computer and delete files and cause other damage to your system as viruses are meant to do. It’s a good idea to be careful when you enable macros. There are a couple of ways to help keep your computer safe; I would look at installing the lasts service packs and updates for Microsoft. I would also make sure I had a strong firewall/anti- virus program on my computer. But, the main way to help keep your computer safe I feel is to pay attention to what you are using, what sites, and what you…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4

    • 262 Words
    • 2 Pages

    What are possible limitations using macros within Microsoft® Excel® and how would you convey this to a user?…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab?…

    • 1087 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    1. Use the Microsoft help feature to find help on the key words “macro”, click on the hyperlink “macro security levels” and display it, copy the second paragraph “Security Because macros…. publishers”, and paste it on a new blank document. Save the document as a type web page as C:\BICDL…\Macro.doc.…

    • 829 Words
    • 4 Pages
    Powerful Essays