You are on page 1of 37

BMIT2703 INFORMATION AND IT SECURITY Assignment

TUNKU ABDUL RAHMAN UNIVERSITY COLLEGE

Bachelor of Business (Honours) Accounting and Finance

Group 4

Written Assignment
BMIT2703 INFORMATION AND IT SECURITY
2020/2021

Name Registration Signatu Marks


(Block Capital) No. re* (For Lecturer /
Tutor use)
1. DAN GYN HOU 20SBR10189
2.AARON CHOO CHUN JIE 20SBR10182
3.WONG WEI HAO 20SBR11246
4.PUAN HONG CHONG 20SBR10199

Ms. Lee Yee Fung


Lecturer/Tutor’s Name: _____________________

1/12/2020
Date of Submission : _____________________

*Please print a copy of this cover page. Place your signatures and then scanned the signed
copy. The scanned copy with the signatures would be used as the cover page.
BMIT2703 INFORMATION AND IT SECURITY Assignment

Plagiarism Statement Form

Read, complete, and sign this statement to be submitted with the written report.

We confirm that the submitted work are all our own work and are in our own words.

Name (Block Capitals) Registration No. Signature*

DAN GYN HOU 20SBR10189


1. …………………………… ……………………………. ………………

AARON CHOO CHUN JIE 20SBR10182


2. …………………………… ……………………………. ………………

WONG WEI HAO 20SBR11246


3. …………………………… ……………………………. ………………

PUAN HONG CHONG 20SBR10199


4. …………………………… ……………………………. ………………

4
Tutorial Group : ………………………………….

1/12/2020
Date : ………………………………….

*Please print a copy of this plagiarism page. Place your signatures and then scanned the
signed copy. The scanned copy with the signatures would be used as the plagiarism page.
BMIT2703 INFORMATION AND IT SECURITY

Individual Tasks Allocation

Indicate (√) in member name column if he/she have involved in that task.
Dan Gyn Hou Aaron Choo Wong Wei Hao Puan Hong
Tasks and description Chun Jie Chong

1. Preparation of Google Forms.


√ √ √ √

2. Analysis of survey responses.


√ √ √ √

3. Identification of threat/vulnerability.
√ √

4. Recommendations for threat/vulnerability.


√ √
ACTKNOWLEDGEMENT
Our group has put in a great amount of effort into completing this assignment. Aside from
efforts, our group has received countless assistance and guidance from many people whom we
are truly grateful for. Without the help and support from these amazing people, we simply could
not finish off this group assignment alone.

We would like to give thanks to our lecturer, Ms Lee Yee Fong, for being one of the main
source of help and support on many problems that our group has encountered. She was also
willing to spend extra time to check on our work and give advice on how we could improve it.
Her clear instructions made it easier for our group to make changes and to produce a better
assignment in overall.

Lastly, each of the members within this group is appreciative towards each other because
it truly was not easy to complete this group assignment. All the group members worked together
with full cooperation throughout the whole assignment and helped one another when problems
surfaced. We are genuinely thankful for all the efforts of each members has put into this
assignment.
TABLE OF CONTENTS
ANALYSIS OF SURVEY RESPONSES........................................................................................1
Device...........................................................................................................................................1
Antivirus.......................................................................................................................................2
Shopping websites/applications...................................................................................................3
THREAT IDENTIFICATION..........................................................................................................4
VULNERABILITY IDENTIFICATION.........................................................................................6
RECOMMENDATIONS.................................................................................................................8
Anti-Phishing Toolbar..................................................................................................................8
Download and install Antivirus software...................................................................................11
REFERENCES..............................................................................................................................16
APPENDICES...............................................................................................................................19
Section A: Charts........................................................................................................................19
Section B: Survey Responses.....................................................................................................26
ANALYSIS OF SURVEY RESPONSES

For this assignment, we have conducted a survey by using Google Survey Form and it is
distributed to 53 students. The responses collected from students have been attached in Section B
of the Appendices. The aim of this survey is to investigate the potential threats and
vulnerabilities that might arise due to students’ actions and preferences. Lastly, to conclude this
assignment we will recommend a few guides as well as software that will help the students to
protect their devices and prevent the identified threat and vulnerability.

Device

Appendix 1 shows that the majority of the students (71.7%) use smartphones as the device for
their regular day-to-day activities. Aside from that, there is still a considerable number of
students (24.5%) who use laptops as their daily device. The less popular devices would be the
notebooks and tablets (1.9%) as there is only a single vote for each type.

The most popular brands are Huawei and Apple as there are 15 students (28.3%) who are using
Huawei devices and coincidentally, there are also 15 students (28.3%) who are using Apple
devices. There are 4 students (7.5%) using Acer devices and there are also 4 students (7.5%)
using Asus devices. There are 3 students (5.7%) using Samsung devices, another 3 students
(5.7%) using Oppo devices and also 3 students (5.7%) using Vivo devices. The remaining brands
such as Poco, MSI, HP and Dell each have less than 3 students (<5%) using their devices
(Appendix 2).

Since smartphones are more commonly used by students, it is no surprise that Android and IOS
would have a larger proportion in the pie chart compared to Operating Systems for personal
computers such as Windows, MacOS and Linux. Most students (41.5%) have Android running
on their devices while 16 students (30.2%) are running IOS. Besides that, there are 14 students
that are running Windows on their devices (Appendix 3). Almost all of the students (94.3%) have
up-to-date Operating Systems running on their devices while only 3 students (5.7%) are running
outdated Operating Systems on their device (Appendix 4).

1
Antivirus

As shown in Appendix 5, most of the students which is 41 students (77.4%) do not install any 3 rd
party antivirus software on their device. In contrast, the remaining 12 students (22.6%) have 3 rd
party antivirus software installed. Half of the students are using Avira, 3 students (25%) are using
McAfee and remaining three students each are using Kaspersky, AVG and Malwarebytes
(Appendix 6). Moreover, the vast majority of students (75%) downloaded their Antivirus
software from the internet for free and the remaining 3 students (25%) have made payments for
their premium Antivirus software (Appendix 7).

Appendix 8 has shown that a substantial number of students (41.7%) update their antivirus
software monthly. Next, there are the same number of students (16.7%) update their antivirus
software yearly and whenever available. 8.3% of students each update their antivirus software
weekly, occasionally and never update their antivirus software.

Referring to Appendix 9, the majority of students (41.7%) only scan their device with their
antivirus software occasionally. A quarter of the students (25%) scan their device weekly and
little over half a quarter of students (16.7%) scan their device daily. Aside from that, the number
of students who scan their device monthly and the number of students who do not scan their
device at all are the same (8.3%). When students are asked which types of antivirus scan they
preferred, the majority of students (41.7%) prefer full scan. While 33.3% of students chose quick
scan and 16.7% of students chose custom scan. There are also 8.3% of students who do not run
any type of scans with their antivirus software (Appendix 10).

As for the 41 students that did not install Antivirus, there are several reasons listed. 22 students
(53.7%) do not see the need to have Antivirus software, 7 students (17.1%) do not know how to
install Antivirus software and 7 students (17.1%) said that the Antivirus software will interfere
with other software. The rest of the 5 students (12.1%) think their built-in Antivirus software is
already good enough (Appendix 11).

2
Shopping websites/applications

Based on Appendix 12, we can see that the majority of students (79.2%) used Shopee as their
preferred online shopping website or application. Next, Taobao is the second most used shopping
website or application by students (49.1%). There are 21 students (39.6%) using Lazada for
online shopping. Moreover, there are only 7 students (13.2%) who used Zalora and only 3
students used Mudah.my (5.7%). Only 1 student (1.9%) used online websites or applications
such as Carousell and Huawei and Honor official website.

Most of the students (>80%) keep their names, phone numbers and emails in the shopping
website or application. There are 40 students (75.5%) who keep their home address in a shopping
website or application. However, there are only 11 students (20.8%) who keep their banking
details in these websites or applications (Appendix 13). Additionally, over half of the students
(60.4%) are using the same password for many shopping websites or applications. The other part
of the students (39.6%) is using different passwords for different shopping websites or
applications (Appendix 14).

3
THREAT IDENTIFICATION

Based on Wilson’s (2005) article on how phishing works. He stated there are 5 main stages in
phishing. Phishing starts with the planning stage; in this stage the phishers will decide which
company to target and figure out how to get the customer emails of that company. The second
stage is the setup; phishers will create the emails that will be used as bait and also the spoofed
website. In the attack stage, the phishers begin to send out the emails which appear to be from a
reputable source to all the targeted victims. The phishers will then collect and record all the
information that the victims had entered into the spoofed website in the collection stage. In the
last stage, the information collected would be used by the phishers for identity theft or commit
other frauds.

According to Appendix 12, we can assume that most of the students have used online shopping
websites or applications. The top 3 most popular shopping websites or applications are Shopee,
Taobao and Zalora. Out of 53 students, 79.2% of them have Shopee, 49.1% of them have Taobao
and 39.6% of them have Lazada. Banday (2007) states that these virtual markets are confronting
a persistently developing threat in terms of identity theft that is causing short-term losses and
long-term economic damage. Among different techniques of identity theft, phishing and its
various variants are the most common and threatening to e-commerce. Based on a research by
Akamai, they have discovered 1,221 domains, or 1,381 URLs, are associated with phishing
campaigns during late 2019 and early 2020. It was found that in excess of 20 unique brands were
involved in these phishing campaigns. But most importantly, the majority of the brands, a whole
84%, were from the e-commerce and media industries (Katz, 2020).

Students could receive emails posing as the shopping websites or applications, asking them to
verify their accounts to avoid the account from expiring within a short period of time. The
students may feel urged and unintentionally fill in their login credentials on a legitimate-looking
website. Once the fraudster has access to the student’s account, they are able to obtain other
sensitive information saved on the account. Based on the survey results (Appendix 13), there are
over 80% out of 53 students that keep their name, phone number and email on the shopping
websites or applications that they use. There 75.5% of students who keep their addresses and
20.8% of them even keep their banking details on these shopping websites or applications.

4
Sysnet Global Solutions (2018) stated that Personally Identifiable Information (PII) such as
names and addresses are commonly used by fraudsters to apply for fraudulent loans or tax
returns. While emails and phone numbers are used for spam and unwanted marketing purposes.

To make things even worse, 60.4% of the students admitted that they use the same password for
different shopping websites or applications (Appendix 14). Imbrogno (2018) agrees that it may
be a challenge to most people to remember a sheer volume of passwords. However, using the
same password for multiple accounts is like having one key to unlock different doors. Relating to
the example of the phishing case above, once the fraudster successfully obtained login
credentials of one shopping website, it is possible that the fraudster will try and use the
discovered credentials across other shopping websites. The fraudster will then be able to collect
much more information if the victim uses the same credentials for different shopping websites.

5
VULNERABILITY IDENTIFICATION

Threat does not just occur by itself. It is associated with vulnerability. According to Dosal
(2020), A vulnerability in a computer system is a flaw or weakness in a system or network that
could be abused to inflict harm or to allow the attacker to control the system in some way. One of
the vulnerabilities that may affect phishing attacks is the poor efficacy of antivirus applications
in computer security.

77.4% of respondents do not have antivirus software installed on their computer (Appendix 5).
According to Milton (n.d), the consequence of not having an antivirus protection is lost data. For
example, a user clicking a malicious link can infect his entire computer system with a virus that
can close down his network, erase hard drives, and spread to other people through the internet.
The lack of antivirus software will place their computer in a very dangerous situation because
there is nothing to protect against the malwares and hackers can access your computer much
easier than compared to having antivirus software. Maday (2019) said that antivirus software
protects users from many kinds of cyber-attack such as ransomware, spyware and hacking. The
functions of the antivirus software is to add an additional layer of security to your device.

From our survey (Appendix 7), there are 75% of respondents using the free version of antivirus
software. However, Avira (2020) emphasized that free versions of antivirus software only
provides a basic level of protection and does not include extra layers of defence such as email
protection and internet protection. Free antivirus software usually provides limited protection, it
can only detect certain types of viruses or threats, users can combine multiple free programs for
more protection but this will slow down the computer performance. Another drawback of free
antivirus product is the lack of real-time customer support. The only way to find solutions to the
technical problems encountered on free antivirus software is from online forums, tutorials or
Google search, however there is no guarantee that the solutions can be found.

In influencing the efficacy of antivirus software, human action against antivirus software is also
significant. There are 8.3%, 41.7%, 16.7%, 8.3% of respondents who update their antivirus
software weekly, monthly, yearly, occasionally respectively, 1 respondent (8.3%) never update
his antivirus software and only 16.7% of respondents are doing it right by updating their

6
antivirus whenever it is available (Appendix 8). According to WhichComputingHelpdesk (2020),
it is crucial to keep your laptop’s antivirus software up to date because there will always be new
type of threats may slip past the computer outdated antivirus software or the outdated antivirus is
not able to detect the newer threats. Therefore, we should be set to automatically or update
whenever available.

By updating antivirus software alone is still not enough to eliminate the threats, users have to
perform a scan to detect the threats to quarantine or remove it from the laptop. 41.7% of
respondents usually run with full scan, 33.3% of respondents choose quick scan and 16.7% of
respondents run custom scan (Appendix 10). Other than that, a total of 58.3% of respondents did
not scan their device either daily or weekly (Appendix 9). WhichComputingHelpdesk (2020)
also says that most security suites are configured to perform a full scan once a week. Users can
also customize the schedule, do a full scan once a week and manual quick scan whenever time
you choose or when your laptop is showing suspicious behaviour. Based on Mercy (2019),
maintaining a schedule of routine scans is important to ensure computers are always protected. If
the computer is infected with viruses and because the user does not have the routine habit of
performing a full scan to his computer, the viruses remain inside the computer and then it may
slowly corrupt the data and cause many software or hardware malfunctions.

Cybersecurity (2019) said that constantly updating the antivirus software on a computer is
necessary because new viruses frequently threaten computers. Antivirus updates contain the
latest files needed to fight against new viruses and protect your computer from new viruses.
Davis (2017) also mentioned people always ignore the software updates but this is a mistake that
allows evolved malware to run without the user noticing it. Based on our survey responses, there
are only 16.7% of respondents who update their antivirus software whenever it is available.
Therefore, failure in constantly updating an antivirus software will cause it to fail to detect new
malwares.

7
RECOMMENDATIONS

Anti-Phishing Toolbar

Based on Cranor (2006), due to the increasing rate of phishing attacks, software vendors with a
vested interest in preventing these attacks have released a variety of “anti-phishing toolbars.”
According to PhishProtection (2020), an anti-phishing toolbar could analyze the website you are
accessing and alerts you when you visit a website which may contain any suspicious content.
There are a lot of popular anti-phishing toolbars such as Avira Browser Safety, Windows
Defender Browser Protection, etc., and our group will be using Netcraft Extension with Google
Chrome for demonstration as it is available for mobile (Android and iOS) and browser (Chrome,
Firefox and Opera). Besides that, Netcraft Extension has a lot of features such as displaying the
domain’s registration dates, hosting country, a link to provide a report about the site and
popularity among other toolbar users. Since phishing sites are hosted for a short period of time
compared to the legitimate sites they imitate, the information provided is helpful in detecting
phishing sites (ScienceDirect, 2020).

To install it, firstly, go to the chrome web store, which can be found from the Apps shortcut in
your bookmarks bar or you may directly enter the URL (https://chrome.google.com/webstore)
into your chrome website. Then, search for “Network Extension” (Figure 5.1) and click on it.
Next, click the “Add to Chrome” button (Figure 5.2). Before the installation, Google Chrome
will ask for your permission to progress (Figure 5.3). After the confirmation, the extension will
be downloaded and it can be found at the top right corner (Figure 5.4).

8
Figure 5.1

Figure 5.2

Figure 5.3

9
Figure 5.4

10
Download and install Antivirus software

According to Rouse (n.d.), Antivirus software is a class of programmes on individual computer


devices, networks and IT systems designed to avoid, identify and eliminate malware infections.
Therefore, it is recommended that users download and install antivirus software from the original
website and to prevent malware installed in the computer.

To do so, our group recommends TotalAV Antivirus as it is free and rated one of the best
antivirus software. To do so, users may search TotalAV antivirus free download in Google Search
and click on the website that is official (Figure 7.1). Users may verify whether it is official or not
by ensuring there is HTTPS as well as authentic website certificate. After entering the web page,
users may locate the ‘Free Download’ button and click it (Figure 7.2). After successfully
downloading the installation package (Figure 7.3) users may click it and allow the installation
process to begin (Figure 7.4). To enable the anti-phishing function, users may locate it to the
settings of TotalAV software (Figure 7.5) and then click WebShield which is under the Real-time
Protection tab (Figure 7.6). Lastly, users must ensure all checkboxes are checked to achieve full
phishing protection (Figure 7.6).

11
1

Figure 7.1

12
3

Figure 7.2

Figure 7.3

13
5

Figure 7.4

Figure 7.5

14
8

Figure 7.6

15
REFERENCES

1. Kay, R., 2004. Sidebar: The Origins Of Phishing. [online] computerworld. Available at:
<https://www.computerworld.com/article/2575094/sidebar--the-origins-of-
phishing.html#:~:text=The%20word%20phishing%20was%20coined,%22sea%22%20of
%20Internet%20users.> [Accessed 24 November 2020].

2. Wilson, T., 2005. How Phishing Works. [online] Howstuffworks. Available at:
<https://computer.howstuffworks.com/phishing.htm> [Accessed 26 November 2020].

3. Banday, M.T., Qadri, J.A. 2007. Phishing - A Growing Threat to E-Commerce, The
Business Review, ISSN: 0972-8384, 12(2), pp. 76-83.

4. Katz, O., 2020. Phishing Victims From A CDN's Point Of View. [online] Akamai.
Available at: <https://blogs.akamai.com/sitr/2020/03/phishing-victims-from-a-cdns-point-
of-view.html> [Accessed 27 November 2020].

5. Sysnet Global Solutions. 2018. What Do Cybercriminals Do With The Data They Steal.
[online] Available at: <https://sysnetgs.com/2018/06/what-do-cybercriminals-do-with-
the-data-they-steal/> [Accessed 28 November 2020].

6. Imbrogno, R., 2018. Using The Same Password For All Your Online Logins?. [online]
Enverus Business Automation. Available at: <https://www.oildex.com/blog/using-the-
same-password-for-all-your-online-logins-why-you-may-be-putting-your-credentials-at-
risk/#:~:text=Using%20the%20same%20password%20for%20more%20than%20one
%20account%20is,of%20your%20accounts%20becomes%20compromised.> [Accessed
26 November 2020].

7. Dosal, E., 2020. Top 9 Cybersecurity Threats And Vulnerabilities. [online]


Compuquip.com. Available at: <https://www.compuquip.com/blog/top-5-cybersecurity-
threats-and-vulnerabilities> [Accessed 23 November 2020].

16
8. Maday, R., 2019. Don’T Get Caught – How To Prevent Phishing Attacks | Avira Blog.
[online] Avira Blog. Available at: <https://www.avira.com/en/blog/how-to-prevent-
phishing-attacks> [Accessed 23 November 2020].

9. Official Avira Support | Knowledgebase & Customer Support | Avira. 2020. How Does
Virus Detection Differ Between Avira Free Antivirus And Avira Antivirus Pro?. [online]
Available at: <https://support.avira.com/hc/en-us/articles/360000118898-How-does-
virus-detection-differ-between-Avira-Free-Antivirus-and-Avira-Antivirus-Pro->
[Accessed 24 November 2020].

10. Milton, K., n.d. Consequences For Companies Not Having Virus Protection. [online]
Small Business - Chron.com. Available at:
<https://smallbusiness.chron.com/consequences-companies-not-having-virus-protection-
59157.html> [Accessed 27 November 2020].

11. Which Computing Helpdesk. 2020. How Often Should My Antivirus Software Update
And Scan?. [online] Available at: <https://computing.which.co.uk/hc/en-
gb/articles/115002560765-How-often-should-my-antivirus-software-update-and-scan-
#:~:text=Your%20security%20software%20should%20be,sure%20this%20is%20the
%20case.> [Accessed 24 November 2020].

12. Mercy, P., 2019. How Does A Virus Scan Protect Your Computer?. [online]
SafetyDetectives. Available at: <https://www.safetydetectives.com/blog/virus-scan-
protect-your-computer/#:~:text=Running%20a%20routine%20virus%20scan,your
%20personal%20data%20at%20risk.> [Accessed 26 November 2020].

13. Cybersecurity.gov.mt. 2019. Why Is It Important To Update Your Antivirus Software? –


Cyber Security Malta. [online] Available at: <https://cybersecurity.gov.mt/why-is-it-
important-to-update-your-antivirus-software/> [Accessed 24 November 2020].

14. Davis, G., 2020. Why Software Updates Are So Important | Mcafee Blogs. [online]
McAfee Blogs. Available at: <https://www.mcafee.com/blogs/consumer/consumer-threat-
notices/software-updates-important/> [Accessed 24 November 2020].

17
15. Cranor, L., Egelman, S., Hong, J. and Zhang, Y., 2006. Phinding Phish: An Evaluation of
Anti-Phishing Toolbars, [online] Available at:
<http://file:///C:/Users/Admin/Downloads/Phinding_Phish_An_Evaluation_of_Anti-
Phishing_Tool.pdf> [Accessed 25 November 2020].

16. PhishProtection.com. 2020. Don’T Be A Phishing Victim : Know Your Anti-Phishing


Chrome Extension | Phishprotection.Com. [online] Available at:
<https://www.phishprotection.com/content/anti-phishing/anti-phishing-chrome-
extension/> [Accessed 25 November 2020].

17. Rouse, M., n.d. What Is Antivirus Software (Antivirus Program)? - Definition From
Whatis.Com. [online] SearchSecurity. Available at:
<https://searchsecurity.techtarget.com/definition/antivirus-software> [Accessed 26
November 2020].

18. Sciencedirect.com. 2020. Netcraft - An Overview | Sciencedirect Topics. [online]


Available at: <https://www.sciencedirect.com/topics/computer-science/netcraft>
[Accessed 28 November 2020].

18
APPENDICES

Section A: Charts

Appendix 1

Appendix 2

19
Appendix 3

Appendix 4

20
Appendix 5

Appendix 6

21
Appendix 7

Appendix 8

22
Appendix 9

Appendix 10

23
Appendix 11

Appendix 12

24
Appendix 13

Appendix 14

25
Section B: Survey Responses

Devices (53 respondents)


No
Email Address Name Type of device Device brand Type of OS OS up-to-date?
.
1 dangf-sb17@student.tarc.edu.my Dan Gyn Fui Laptop Acer Windows Yes
2 aaronccj-sb18@student.tarc.edu.my Aaron Choo Chun Jie Laptop Acer Windows Yes
3 madelincyt-sb19@student.tarc.edu.my Madelin Chua Laptop HP Windows Yes
4 sohcxe-sj19@student.tarc.edu.my Soh Cheng Xiang Elvin Smartphone Oppo Android Yes
5 wongds-sb19@student.tarc.edu.my Wong Dyi Sheng Smartphone Oppo Android Yes
6 chungmy-sb18@student.tarc.edu.my Chung May Yan Laptop Asus Windows Yes
7 yapkw-wl19@student.tarc.edu.my Yap Ken Wei Smartphone Samsung Android Yes
8 wongks-sb17@student.tarc.edu.my Wong Kuang Shen Smartphone Huawei Android Yes
9 darrencym-sb19@student.tarc.edu.my Darren Chee Yee Ming Smartphone Apple IOS Yes
10 chongzl-sj19@student.tarc.edu.my Chong Zi Loong Smartphone Huawei Android Yes
11 syuhaidahby-wl19@student.tarc.edu.my Syuhaidah Shajahan Smartphone Apple IOS Yes
12 gressiemjk-sb19@student.tarc.edu.my Gressie Mae Justin Kindasan Laptop Acer Windows Yes
13 callyfpc-sb19@student.tarc.edu.my Cally Fung Pei Cee Smartphone Apple IOS No
14 yeojh-sb18@student.tarc.edu.my Yeo Jing Hui Smartphone Huawei IOS Yes
15 yannieksy-sb19@student.tarc.edu.my Yannie Ksy Smartphone Apple IOS Yes
16 sandracfy-sb17@student.tarc.edu.my Sandra Chin Fei Yieng Tablet Apple IOS Yes
17 kongyx-sb19@student.tarc.edu.my Kong Yu Xuan Smartphone Apple IOS Yes
18 chinyx-wl19@student.tarc.edu.my Chin Yong Xiang Smartphone Huawei Android Yes
19 victoriacsw-sj19@student.tarc.edu.my Victoria Chong Siaw Wei Smartphone Huawei Android Yes
20 ednacsy-sb17@student.tarc.edu.my Edna Chung Su Yen Smartphone Apple IOS Yes
21 nelsonchc-sj19@student.tarc.edu.my Nelson Chua Hong Chun Smartphone Huawei Android Yes
22 rachelwckf-sj19@student.tarc.edu.my Rachel Winnie Chin Kah Fui Smartphone Vivo Android Yes
23 yongpl-sb19@student.tarc.edu.my Yong Pei Ling Smartphone Apple IOS Yes
24 annfyy-sb18@student.tarc.edu.my Ann Fan Yan Yan Smartphone Asus Android Yes
25 bryantkb-sb19@student.tarc.edu.my Bryan Tio Kian Boon Smartphone Huawei Android Yes
26 thienyx-sb19@student.tarc.edu.my Thien Yu Xiang Smartphone Samsung Android Yes
27 cheejm-sb19@student.tarc.edu.my Chee Jia Ming Smartphone Apple IOS Yes
28 limcn-sb20@student.tarc.edu.my Lim Chen Nam Smartphone Huawei Android Yes
29 chongsy-sb19@student.tarc.edu.my Chong Shing Yei Laptop Lenovo Windows Yes
30 chongys-sb17@student.tarc.edu.my Chong Ye Shen Smartphone Huawei Android Yes

26
No Type of
Email Address Name Device brand Type of OS OS up-to-date?
. device
31 laugm-sb18@student.tarc.edu.my Lau Gek Mei Smartphone vivo Android Yes
32 nguiks-sb17@student.tarc.edu.my Ngui Kin Soon Smartphone Huawei Android Yes
33 nicholasyrl-sb20@student.tarc.edu.my Nicholas Yapp Rong Liang Smartphone Apple IOS Yes
34 changwy-wb19@student.tarc.edu.my Chang Woei Ying Smartphone Apple IOS Yes
35 changsm-sb20@student.tarc.edu.my Chang Sieu Meah Laptop Lenovo Windows Yes
36 chongyw-sb18@student.tarc.edu.my Chong Yi Wei Laptop Asus Windows Yes
37 chongkh-wb19@student.tarc.edu.my Chong kang hong Smartphone Huawei Android Yes
38 syahirahby-sj19@student.tarc.edu.my Syahirah binti Yacob Smartphone Huawei Android Yes
39 chongks-wl19@student.tarc.edu.my Chong Kah Sheng Smartphone oppo Android No
40 janicezjw-sb17@student.tarc.edu.my Janice Zang Smartphone Apple IOS Yes
41 leecy-sb18@student.tarc.edu.my Lee Chong Yew Smartphone Poco Android Yes
42 puanhc-sb18@student.tarc.edu.my Puan Hong Chong Smartphone Apple IOS Yes
43 tangzt-sj18@student.tarc.edu.my Tang Zhin Thon Laptop Acer Windows Yes
44 gohyt-sm18@student.tarc.edu.my Goh Ying Teik Smartphone Apple IOS No
45 yongjc-sm18@student.tarc.edu.my Yong Jian Ching Laptop MSI Windows Yes
46 isabelwts-sb18@student.tarc.edu.my Isabel Wong Tsuey Shin Smartphone Apple IOS Yes
47 pierrelfc-sm18@student.tarc.edu.my Pierre Law Laptop Asus Windows Yes
48 isaacwjy-wb20@student.tarc.edu.my Isaac Wong Jun Yuan Laptop Huawei Windows Yes
49 simoncyh-sm18@student.tarc.edu.my Simon Chen Yi Heng Smartphone Vivo Funtouch OS Yes
50 leekh-sm20@student.tarc.edu.my Lee Kian Hui Smartphone Samsung Android Yes
51 chongjw-sm18@student.tarc.edu.my Chong Jiang Wei Laptop Dell Windows Yes
52 gracelys-wb18@student.tarc.edu.my Grace Ling Yi Sing Smartphone Huawei Android Yes
53 poonyy-sb18@student.tarc.edu.my Poon Yea Yee Notebook Huawei Windows Yes

27
Students who have 3rd party Antivirus software (12 respondents)
Part 1

No. Name Antivirus Brand Antivirus subscription How often is Anti-Virus updated? How often do you scan your device?
1 Madelin Chua Avira Downloaded for free Weekly Weekly
2 Chung May Yan Avira Downloaded for free Occasionally Occasionally
3 Gressie Mae Justin Kindasan Avira Downloaded for free Monthly Occasionally
4 Chee Jia Ming AVG Downloaded for free Monthly Weekly
5 Chong Shing Yei McAfee Downloaded for free Monthly Occasionally
6 Lau Gek Mei Avira Paid subscription Yearly Monthly
7 Chang Sieu Meah McAfee Downloaded for free Whenever available Never
8 Chong Yi Wei Avira Paid subscription Monthly Weekly
9 Syahirah Binti Yacob Kaspersky Paid subscription Whenever available Daily
10 Tang Zhin Thon Avira Downloaded for free Yearly Occasionally
11 Pierre Law McAfee Downloaded for free Never Occasionally
12 Isaac Wong Jun Yuan Malwarebytes Downloaded for free Monthly Daily

Part 2
No
Name Type of scan usually used
.
1 Madelin Chua Full scan
2 Chung May Yan Full scan
3 Gressie Mae Justin Kindasan Full scan
4 Chee Jia Ming Custom scan
5 Chong Shing Yei None of the above
6 Lau Gek Mei Full scan
7 Chang Sieu Meah Quick scan
8 Chong Yi Wei Quick scan
9 Syahirah Binti Yacob Full scan
10 Tang Zhin Thon Custom scan
11 Pierre Law Quick scan
12 Isaac Wong Jun Yuan Quick scan

28
Student who does not have 3rd party Antivirus software (41 respondents)
No
Name Reason of not having 3rd party Antivirus
.
1 Dan Gyn Fui Windows Defender is adequate for my daily usage.
2 Aaron Choo Chun Jie I do not see the need to have Anti-virus software.
3 Soh Cheng Xiang Elvin I do not see the need to have Anti-virus software.
4 Wong Dyi Sheng I do not see the need to have Anti-virus software.
5 Yap Ken Wei I do not see the need to have Anti-virus software.
6 Wong Kuang Shen I do not see the need to have Anti-virus software.
7 Darren Chee Yee Ming I do not see the need to have Anti-virus software.
8 Chong Zi Loong The Anti-virus software interferes with other software.
9 Syuhaidah Shajahan I do not see the need to have Anti-virus software.
10 Cally Fung Pei Cee I do not know how to install Anti-virus software.
11 Yeo Jing Hui Bcs Huawei number 1
12 Yannie Ksy I do not know how to install Anti-virus software.
13 Sandra Chin Fei Yieng I do not see the need to have Anti-virus software.
14 Kong Yu Xuan I do not know how to install Anti-virus software.
15 Chin Yong Xiang I do not see the need to have Anti-virus software.
16 Victoria Chong Siaw Wei The Anti-virus software interferes with other software.
17 Edna Chung Su Yen I do not see the need to have Anti-virus software.
18 Nelson Chua Hong Chun The Anti-virus software interferes with other software.
19 Rachel Winnie Chin Kah Fui The Anti-virus software interferes with other software.
20 Yong Pei Ling I do not know how to install Anti-virus software.
21 Ann Fan Yan Yan The Anti-virus software interferes with other software.
22 Bryan Tio Kian Boon I do not see the need to have Anti-virus software.
23 Thien Yu Xiang I do not know how to install Anti-virus software.
24 Lim Chen Nam I do not see the need to have Anti-virus software.
25 Chong Ye Shen I do not see the need to have Anti-virus software.
26 Ngui Kin Soon I do not see the need to have Anti-virus software.
27 Nicholas Yapp Rong Liang The Anti-virus software interferes with other software.
28 Chang Woei Ying I do not know how to install Anti-virus software.
29 Chong Kang Hong I do not see the need to have Anti-virus software.
30 Chong Kah Sheng I do not see the need to have Anti-virus software.

29
No. Name Reason of not having 3rd party Antivirus
31 Janice Zang I do not see the need to have Anti-virus software.
32 Lee Chong Yew The Anti-virus software interferes with other software.
33 Puan Hong Chong I do not see the need to have Anti-virus software.
34 Goh Ying Teik I do not see the need to have Anti-virus software.
35 Yong Jian Ching Windows Defender is already enough
36 Isabel Wong Tsuey Shin I do not see the need to have Anti-virus software.
37 Simon Chen Yi Heng The original built-in anti-virus software is good enough ady
38 Lee Kian Hui I do not see the need to have Anti-virus software.
39 Chong Jiang Wei Useful/Effective Anti-virus are too expensive
40 Grace Ling Yi Sing I do not know how to install Anti-virus software.
41 Poon Yea Yee I do not see the need to have Anti-virus software.

30
Shopping websites/applications (53 respondents)
No
Name Shopping website/application used Do you reuse passwords? Information stored on shopping website/application
.
1 Dan Gyn Fui Shopee, Lazada, Carousell Yes Name, Address, Phone number, Email, Banking details
2 Aaron Choo Chun Jie Shopee, Lazada Yes Name, Address, Phone number, Email
3 Madelin Chua Taobao No Email
4 Soh Cheng Xiang Elvin Shopee Yes Name, Address, Phone number, Email, Banking details
5 Wong Dyi Sheng Shopee, Lazada, Taobao No Name, Address, Phone number, Email
6 Chung May Yan Shopee, Lazada, Taobao Yes Name, Address, Phone number, Email, Banking details
7 Yap Ken Wei Shopee Yes Name, Phone number, Email
8 Wong Kuang Shen Shopee, Lazada, Zalora, Taobao Yes Name, Address, Phone number, Email
9 Darren Chee Yee Ming Shopee, Zalora No Name, Phone number
10 Chong Zi Loong Shopee Yes Name
11 Syuhaidah Shajahan Shopee, Lazada Yes Address, Phone number, Email
12 Gressie Mae Justin Kindasan Shopee No Name, Address, Phone number, Email
13 Cally Fung Pei Cee Taobao Yes Name, Address, Phone number, Banking details
14 Yeo Jing Hui Shopee Yes Name, Address, Phone number, Email
15 Yannie Ksy Taobao Yes Name, Address, Phone number, Email
16 Sandra Chin Fei Yieng Shopee, Zalora, Taobao No Name, Address, Phone number, Email
17 Kong Yu Xuan Shopee, Lazada, Taobao Yes Name, Phone number, Email
18 Chin Yong Xiang Shopee, Lazada, Taobao Yes Name, Address, Phone number, Email
19 Victoria Chong Siaw Wei Shopee, Lazada, Taobao Yes Name, Address, Phone number, Email
20 Edna Chung Su Yen Taobao Yes Name, Address, Phone number, Email
21 Nelson Chua Hong Chun Shopee, Lazada, Zalora, Taobao, Mudah.my Yes Name, Address, Phone number, Email
22 Rachel Winnie Chin Kah Fui Shopee, Taobao No Name
23 Yong Pei Ling Shopee, Lazada, Taobao No Name, Address, Phone number, Email, Banking details
24 Ann Fan Yan Yan Shopee Yes Name, Address, Phone number, Email
25 Bryan Tio Kian Boon Shopee Yes Name, Address, Phone number, Email, Banking details
26 Thien Yu Xiang Shopee, Lazada No Email
27 Chee Jia Ming Zalora No Phone number
28 Lim Chen Nam Shopee, Lazada, Taobao No Address, Phone number, Email
29 Chong Shing Yei Shopee, Taobao No Name, Phone number
30 Chong Ye Shen Lazada No Name, Address, Phone number, Email

No Name Shopping website/application used Do you reuse passwords? Information stored on shopping website/application
31
.
31 Lau Gek Mei Shopee, Taobao Yes Name, Address, Phone number, Email, Banking details
32 Ngui Kin Soon Shopee Yes Name, Address, Phone number, Email
33 Nicholas Yapp Rong Liang Lazada, Zalora, Mudah.my No Name, Address, Phone number, Email, Banking details
34 Chang Woei Ying Shopee, Taobao Yes Name, Address, Phone number, Email, Banking details
35 Chang Sieu Meah Shopee, Taobao Yes Name, Address, Phone number, Email
36 Chong Yi Wei Lazada No Name, Email
37 Chong Kang Hong Shopee, Mudah.my Yes Name, Address, Phone number, Email
38 Syahirah Binti Yacob Lazada No Name, Email
39 Chong Kah Sheng Shopee No Address, Email
40 Janice Zang Shopee, Taobao No Name, Address, Phone number
41 Lee Chong Yew Shopee, Lazada Yes Name, Address, Phone number, Email, Banking details
42 Puan Hong Chong Shopee Yes Name, Address, Phone number, Email
43 Tang Zhin Thon Taobao Yes Phone number
44 Goh Ying Teik Shopee, Lazada, Taobao Yes Name, Address, Phone number, Email
45 Yong Jian Ching Shopee, Lazada Yes Name, Address, Phone number, Email
46 Isabel Wong Tsuey Shin Shopee, Taobao No Name, Address, Phone number, Email
47 Pierre Law Shopee Yes Email
48 Isaac Wong Jun Yuan Shopee Yes Name, Address
49 Simon Chen Yi Heng Shopee, Taobao Yes Name, Address, Phone number, Email, Banking details
50 Lee Kian Hui Shopee Yes Name, Address, Phone number, Email
51 Chong Jiang Wei Huawei and Honor official website No Name, Address, Phone number, Email
52 Grace Ling Yi Sing Shopee, Taobao No Name, Address, Phone number
53 Poon Yea Yee Shopee, Lazada, Zalora, Taobao No Name, Address, Phone number, Email

32

You might also like