Preview

CheckPoint: The Risk of Macros

Good Essays
Open Document
Open Document
325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CheckPoint: The Risk of Macros
CheckPoint: The Risk of Macros

Based on the Lenning (2005), article and reading from the Microsoft web site a user should accept the primary security that is placed on the user’s computer by Microsoft. The security’s purpose is to protect the computer’s hardware as well as the data saved to the computer. Unknown macros downloaded by the user may cause the Microsoft security system to think it has a virus. The user must be cautious when choosing whether to use a signed or unsigned macro. Many unsigned macros are automatically disabled. (Microsoft, 2002). It is important to educate users of these risks once their dilemma is resolved. The continued alerts sent by the Microsoft security system to Microsoft itself will educate the user and the program as to whether or not a macro is a virus or not. Another reason it is important is because the user might be receiving alerts that there are viruses or some sort of security issue to the user’s computer. The worst type of macros is an actual virus and this virus may not be recognized by a security program. Macros may also unintentionally delete data or information the user saved on the computer and could be deleted by the computer for no apparent reason.
To ensure the risks are minimized when using MS Excel on their computer, you should limit any unwanted users to login or to use your computer. The owner/user can control or limit unwanted email, viruses, spam, cookies and any other types of unwanted Internet searches. These unwanted searches often attempt to obtain the user’s personal information, which can also infect the computer with a virus. The best way to protect the user’s personal and their computer is to use protected passwords and stay aware when searching and browsing the web. Users should never give their password or personal information to others unless they feel it is safe to do so.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Accounting 315

    • 1877 Words
    • 8 Pages

    Extensive detail and information is contained within the help function of Microsoft Excel and in the provided text.…

    • 1877 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Although Microsoft Excel is an acceptable platform for business, there are disadvantages to the program. When developing Microsoft Excel into a file, depending on the size, program execution may…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As our society realize more and more on technology like computers and smart phones to conduct every day things such as banking, work, school, and staying connected with family and friends, our personal information has become more vulnerable to attack. Before computers, if someone wants to steal your personal information they would need to break in to your house, work and car to try and get your information. Now everything about us are stored right on our computers from banking information, to medical information. Some of the most common forms of attack on Microsoft system are Trojan horse, backdoor, denial of service, robot/intermediary process, unprotected…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Even though Macros do it yourself software is ranked as one of Microsoft’s most useful tools to use. Based on the article by Lenning (2005) the primary security risk for users to know using macros is that many of these sites could have many different types of viruses. It is recommended that one should use caution when opening a new document. You should only open and used a trusted because some files can be corrupted and then they will spread viruses to your computer and most of the time you do not know where they come from. Depending on which version that you are going to use you will get a warning every time for a file that contains a macro. This is done because many times macros can be programmed to act like a virus. Before even considering opening a marcro site one has to remember that it can be dangerous to their computer. Because these viruses that pretend to be a marco they can get into your computer and delete files and cause other damage to your system as viruses are meant to do. It’s a good idea to be careful when you enable macros. There are a couple of ways to help keep your computer safe; I would look at installing the lasts service packs and updates for Microsoft. I would also make sure I had a strong firewall/anti- virus program on my computer. But, the main way to help keep your computer safe I feel is to pay attention to what you are using, what sites, and what you…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Procedural Safeguards

    • 409 Words
    • 2 Pages

    Two fundamental rights are protected by procedural due process safeguards, procedural rights and substantive rights (Yell 2016). There are two types of procedural safeguards important to the implementation of the IDEA. Yell (2016) explains that “procedural safeguards guide the method by which school officials make decisions regarding the education of students with disabilities, and substantive due process rights are those personal rights that school officials may not abridge (p. 261). The fundamental reason to follow the established due process guidelines are to protect the procedural rights of parents.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The threat that can arise are if an employee downloads a virus, malware, or Trojan to their mobile phone, laptop, and even desktop. This is especially so for the remote devices because when these are connected to the Exchange server, it can infect the corporate network. If an employee is using their desktop to surf the Internet for personal usage and they open an email sent by a friend that has a virus attached, it can infect the network. Another example is if an employee registers for something personal online, such as a sweepstakes, this…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Malware and Spyware

    • 976 Words
    • 4 Pages

    * Unconfirmed code: code from a floppy disk, CD-ROM or USB device may be executed without the user’s permission.…

    • 976 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Rick had discussed with Mr. Ball the prospect of using the centralized computer system to run word processing and spreadsheet software on terminals. Mr. Ball was alarmed about the security issue…

    • 1445 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    A macro instruction (abbr. macro) is a notational convenience for the programmer. A macro represents a commonly used group of statements in the source programming language. The macro processor replaces each macro instruction with the corresponding group of source language statements.…

    • 693 Words
    • 3 Pages
    Good Essays