It/206 Week 4 Checkpoint — the Risk of Macros
Essay Preview: It/206 Week 4 Checkpoint — the Risk of Macros
Report this essay
IT/ 206 Week 4 Checkpoint:
The Risk of Macros
What is a primary security risk that users should acknowledge when using macros?
From what I read and found from the Student text, the Microsoft web site and the Internet, and based on the article by Lenning (2005), a user should accept the primary security that is placed on the users computer by Microsoft. The security has a purpose of protecting the computers hardware, and for the data saved on the users computer. Unknown macros placed on a computer or downloaded by the user, the Microsoft security system thinks the computer has a virus. The user should be careful in choosing between a signed or unsigned macros; and the purpose of any unsigned macros are automatically disabled. (Microsoft, 2002).

Why is it important to educate users of these risks once their dilemma is resolved?
There are some good reasons to educate users about the various macros risks even after the users dilemma is resolved. I think one of the main reasons is the continued alerts sent by the Microsoft security system every time the user trys to use one of the various Microsoft suites with the macro in the program. The second could be the user might be getting alerts that there are viruses or some type of security breach to the users computer. The worst of the virus type of macros that could be produced by the security protection on the computer that is part of Microsoft suite program, is the data or any type of information the user saved on the computer, could be deleted by the computer for no reason – at least not known to the user.

What types of support strategies should be utilized to ensure risks are minimized?
The types of support strategies that all users should utilize to ensure the risks are minimized when using MS Excel on their computer, is to limit the process of allowing any unwanted users to login or to use your computer. When a user keeps a close watch on their computer by other users, the owner/user can control or limit the unwanted email, viruses, spam, cookies and any other types of the unwanted Internet searches engines trying to get at the owner and users personal information and infecting the computer with viruses.

So the best possible way to protect the users personal and their computer is to always use protected passwords and to watch out when surfing on the Internet, and do not give out the password or personal information to others.

Reference
Microsoft.com, (2002). Unsigned macro(s). Retrieved from,

Get Your Essay

Cite this page

Users Computer And Type Of Security Breach. (June 9, 2021). Retrieved from https://www.freeessays.education/users-computer-and-type-of-security-breach-essay/