Thursday, 5 May 2016

clo 5 SMOKING

SMOKING
LSS 2533 Research Methods
CLO 5 – Research Proposal







Khalid Akaabi
H00247641
CJM





Overview:

 

This paper reviews three articles on Smoking

Section 1: Library research Description

Section 2: Article abstracts and references

Section 3: Research descriptions

Section 4: Article evaluation




















Article 1

Section 1:
Article source: Library search pages of HCT > Discover > Electronic Resources
Search terms: Smoking
Section 2:
Title of the article: Design, Baseline Results of Irbid Longitudinal, School-based Smoking Study.

Abstract

Objective: To compare patterns of water pipe and cigarette smoking in an eastern Mediterranean country. Methods: In 2008, 1781 out of 1877 seventh graders enrolled in 19 randomly selected schools in Irbid, Jordan, were surveyed. Results: Experimentation with and current water pipe smoking were more prevalent than cigarette smoking (26.8%; 20.2% vs boys: 38.7% vs 9.0%, girls: 9.5%; and 7.5% vs 21.2% vs 2.3%, P<0.05 for all). Parent- and peer-smoking correlated more strongly with water pipe than with cigarette smoking. Conclusion: Water-pipe smoking is more prevalent than cigarette smoking at this early age.

References
Mzayek, Fawaz; Khader, Yousef; Eissenberg, Thomas; Ward, Kenneth D.; Maziak, Wasim. (2012), Design, Baseline Results of Irbid Longitudinal, School-based Smoking Study, American Journal of Health Behavior (AM J HEALTH BEHAV), Nov/Dec2011; 35(6): 746-755. (10p)
Section 3:
Title: Design, Baseline Results of Irbid Longitudinal, School-based Smoking Study.
Population
1781 out of 1877 seventh graders enrolled in 19 randomly selected schools in Irbid in 2008
Research Design
The article takes a quantitative approach and it describing smoking rates (boy and girl) in Jordan
Participant selection
There were no selection criteria. The survey was based on 19 randomly selected schools in Irbid, Jordan.
Main findings
Water pipe smoking is more prevalent than cigarette smoking at this early age, based on Experimentation with and current water pipe smoking were more prevalent than cigarette smoking (boys: 38.7% vs 26.8%; 20.2% vs 9.0%, girls: 21.2% vs 9.5%; and 7.5% vs 2.3%, P<0.05 for all). Parent- and peer-smoking correlated more strongly with water pipe than with cigarette smoking.

Section 4:
Ranking – Low

________________________________________________________________________

Article 2


Section 1:
Article source: Library search pages of HCT > Discover > Electronic Resources
Search terms: Smoking
Section 2:
Title: Trajectories of smoking among freshmen college students with prior smoking history and risk for future smoking: data from the University Project Tobacco Etiology Research Network (UpTERN) study.


Abstract
AIMS: Little is known about smoking during the transition to college. The current study examined trajectories of smoking among college freshmen, how trajectories predicted later smoking and the social context of smoking. DESIGN: Weekly assessments of daily smoking were collected via the web during the first year of college for a large cohort with a previous history of smoking. PARTICIPANTS AND SETTING: A total of 193 college freshmen from a large public university with a previous history of smoking who smoked frequently enough to be included in trajectory analysis. MEASUREMENTS: Measures included weekly reports of daily smoking, family smoking, perceived peer attitudes and smoking, social norms and social smoking environment. FINDINGS: Seven trajectories were identified: one of low-level sporadic smoking, one of low-level smoking with a small increase during the year, two classes with a substantial decrease during the year, two classes with relatively small decreases and one class with a substantial increase in smoking. Trajectories of smoking in the freshman year predicted levels of sophomore year smoking, and some social context variables tended to change as smoking increased or decreased for a given trajectory class. CONCLUSIONS: The transition into college is marked by changes in smoking, with smoking escalating for some students and continuing into the sophomore year. Shifts in social context that support smoking were associated with trajectories of smoking. Despite the focus of developmental models on smoking in early adolescence, the transition into college warrants further investigation as a dynamic period for smoking.
References
Tobacco Etiology Research Network (TERN). (2008). Trajectories of smoking among freshmen college students with prior smoking history and risk for future smoking: data from the University Project Tobacco Etiology Research Network (UpTERN) study. Addiction (ADDICTION), Sep2008; 103(9): 1534-1543. (10p)
Section 3:
Title of the paper: Trajectories of smoking among freshmen college students with prior smoking history and risk for future smoking: data from the University Project Tobacco Etiology Research Network (UpTERN) study.

Population
A total of 193 college freshmen from a large public university with a previous history of smoking who smoked frequently enough to be included in trajectory analysis.
Research design
This study employs qualitative research design to do weekly assessments of daily smoking were collected via the web during the first year of college for a large cohort with a previous history of smoking. Measures included weekly reports of daily smoking, family smoking, perceived peer attitudes and smoking, social norms and social smoking environment.
Participant selection
University students with a previous history of smoking who smoked frequently enough to be included in trajectory analysis.
Main outcomes
Seven trajectories were identified: one of low-level sporadic smoking, one of low-level smoking with a small growth during the year, two classes with a substantial decrease during the year, two classes with relatively small decreases and one class with a substantial increase in smoking. Trajectories of smoking in the freshman year predicted levels of sophomore year smoking, and some social context variables tended to change as smoking increased or decreased for a given trajectory class
Section 4:
Ranking – Mid

__________________________________________________________________
Article 3
Section 1:
Article source: Library search pages of HCT > Discover > Electronic Resources
Search terms: Smoking


Section 2:
Title: Smoking of parents and Best Friend Independent and Combined Effects on Adolescent Smoking and Intention to Initiate and Quit Smoking.
Abstract
Introduction: This study examines the independent and combined effects of smoking of parents and best friend on smoking and the intention to initiate or quit smoking in adolescents. Methods: In this school-based survey, 6,553 Hong Kong students aged 13–18 reported their demographic characteristics, smoking status of themselves, parents, and best friend; and intention to smoke (initiation among never-smokers and reinitiating among ex-smokers) or quit smoking among current smokers. Logistic regression yielded adjusted odds ratios (AORs) of student smoking (current/ever) and intention to smoke or quit smoking for parental (paternal/maternal/both parents vs. none) and best friend (yes vs. no) smoking. Results: Parental smoking and having a smoking best friend were associated with adolescent current smoking, ever smoking, and intention to initiate smoking. Having a smoking best friend was also associated with reinitiating and quitting smoking. The AORs (95% CI) of current smoking for having a smoking best friend, in addition to smoking father, mother, or both were 19.14 (14.36–25.51), 20.38 (12.42–33.43), and 24.18 (15.89–36.77). The respective AORs of ever smoking were 8.30 (6.74–10.22), 8.92 (5.63–14.12), and 11.99 (8.05–17.87). Conclusions: Parental smoking and best friend smoking have independent effects on adolescent smoking behaviors. Their combined effects on current and ever smoking were particularly large. Smoking prevention programs should pay special attention to adolescents with both best friend and parents who smoke.
References
Mak, Kwok-Kei1 & Ho, Sai-Yin1 & Day, Jeffrey R. Smoking of Parents and Best Friend Independent and Combined Effects on Adolescent Smoking and Intention to Initiate and Quit Smoking., Nicotine & Tobacco Research. Sep2012, Vol. 14 Issue 9, p1057-1064. 8p.



Section 3:
Population
The population used in the research was 6,555 students aged 13 – 18 in schools in the city of Hong Kong, China.  The research was categorized by different demographic characteristics, smoking status of themselves, parents, and best friend; and intention to smoke (initiation among never-smokers and reinitiating among ex-smokers) or quit smoking among current smokers.
Research design
This study involves qualitative survey method of school based students. It was mentioned the type of questions used in the survey, as they were specific to a Yes or No answers and certain options of Present/Never or Fathers/Best friend or None. The results were discussed in details but not individually but rather as a group.
Participant selection
The research doesn’t specify why that specific school/s or students were chosen to be surveyed. The research was based on students who had parents or best friends who are smoking or if they were smokers themselves. Some students were categorized as smokers themselves; others had parents or best friends who were smokers.
Main Findings
The researcher concluded that smoking started manly at adolescent smoking behaviors and was encouraged if that adolescent had a smoking best friend who is a smoker or father/mother or both. Therefore, the smoking prevention programs should focus on these adolescents.  The researcher also demonstrated the following numbers regarding the AORs (95% CI) of current smoking for having a smoking best friend, in addition to smoking father, mother, or both were 19.14 (14.36–25.51), 20.38 (12.42–33.43), and 24.18 (15.89–36.77). The respective AORs of ever smoking were 8.30 (6.74–10.22), 8.92 (5.63–14.12), and 11.99.

Section 4:
Rank – High

The survey approach used in this article helps us to understand how a smoking habit can start from such a young age like adolescents. Also it was very specific to the age group that was surveyed and to the city they were surveyed in. The researcher gave us a closer insight to the city of Hong Kong and the smoking habits of some of its population as well as the causes behind it. He also gave us detailed numbers on the outcome of the effect of having a smoking best friend or parents. These numbers revealed that smoking habits may increase among adolescents if they have a smoking parent or best friend. This research may also help the awareness of the smoking prevention program and allowing them to focus on a specific age segments. Therefore, parents should stop or minimize their smoking habits so they don’t harm their children and pay close attention to their kid's best friends.

However, the survey didn’t discuss the causes of smoking and what was the reason or main influence to smoke. Also, the survey didn’t mention that if the kids were aware of the effect of smoking on health, and if there were non-smoker friends that have positive influence.

Sunday, 6 March 2016

clo 3


Computer viruses
LSS 2533 Research Methods

CLO 3 – Research Proposal







Khalid Akaabi
H00247641
CJM











Contents 




Justification 

Background report summary
Data collection procedures 
Research questions and results
Discussion of the results








Justification:




                          This topic will be very helpful for those people who don't know the difference between viruses and how to protect your computer from it. Many old people like my friend or brother who just does work on a personal computer and use it just for work time to do work but there are many reasons why I do about computer viruses because there are many people are not yet awake to the danger that is coming and they have to know a little bit about it to try to defend themselves against this kind of danger and protect themselves. And I will try my best to make you know the difference between viruses.



Background report summary

Introduction:

Nowadays there are many viruses and a malwares programs around you and you have much vulnerability that hackers can use to gain information from you so you have to know the different kinds of virus and how to protect yourself against hackers.In this report we describ computer viruses and how to protact your computer against them. And we justify this topic from the real life. 

Kind of Viruses:  

Viruses and worms are the same; the only difference is that worms can replicate themselves to many contact emails or users you have the only difference is worms do not replicate them selves but both can make same damage to you.
Dos/DDos are a way to send a lot of requests to your server/system by sending many requests and trying to bring your system down by requesting many service DOS and DDOS; in DOS you send it by yourself but with DDOS you use many user systems called zombies to help you in sending requests.

Trojan Horse and Spyware Trojan horse a malwares programs in your computer hackers use it a lot to open ports in your system, copying data, modifying, blocking data and deleting data so it can access your system or change data delete copy it so harms and spyware its same type of malware that installed on a computer without your knowledge of the owner the difference between them ;spyware can replicate itself and Trojan horse cannot do that by itself.

Llike other viruses, logic bombs are designed to cause harm to your computer. Logic bombs, however, only trigger when specific conditions are met. For example a computer programmer may insert code into a payroll program that deletes files if her name is not found on the list. This means that files will be deleted if she is ever fired. A company named Omega Engineering lost millions of dollars as a result of a logic bomb left by a former employee. Other viruses, called time bombs, may only detonate on a specific date or time. An example of this is the Jerusalem virus which, every Friday the 13th, deletes all the files on an infected computer.

Data collection procedures

The primary data collection is the way to collect data from people using questionnair. The number of questions are 10 different questions that talk about my subject, which is computer viruses. I try to make question bettwen IT student and teacher to have really good answer and predused in chart and persentge scheduled all 10 student and teacher participating  in and thanks to them a lot.

Research Questionnaires


Primary Sub-Questions
What are computer viruses in your words?

1- Malware program    2- Trojan horse    3- all of the above
Secondary Question
Do ADMC students know the difference between types of virus?
Do you feel happy with dealing with computers daily in your work?
Do you feel absolutely safe when you have an antivirus in your computer?
Do you count on your computer and internet in your daily routine?
Do ADMC students know how to prevent this kind of virus?
Do you have antiviruses in your computer?
Do you have any untrusted program in your computer? 
Does anyone ever send you viruses?
Do you recognize viruses or not?




Result:





 1- 60% of people chose all of the above, 30% of people chose
    A text file and 10% of people chose malware program

2- 50% of people found that ADMC students don’t know difference and 50% think they know

3- 100 % feel happy dealing with their own computer in their work

4- 70% feel absolutely safe when they have antiviruses; 30% feel they are not absolutely safe

5- 80% count on computer and internet in daily routine and 20% do not count on it

6- 60% of people say that students can prevent most common viruses and 40% say they cannot

7- 90% of people say they have antiviruses in their computer and 10%  don’t

8- 70% of people say that they do not have untrusted program in their computer and 30%
have it

9- 70% of people say that someone sent them a viruses in their computer and 30% say not

10-80% of people say that they can recognize viruses in their computer and 20% they said
 they can’t






Questioner data result and discussion  


My opinion:


After I collect the results of my questioner I cover In my questionnaire teacher and student from (IT) security and most of them were answering same answer and actually I agree with most with most of it if you ask me personally I will be same of the people that participate to answer. I came up with viruses can be send it to other client by internet or physical and have many kind of viruses that you should know what this kind and when it use and why and how to protect yourself.









Conclusion

Finally you have to use anti viruses to detect this kind and viruses and block it right in time before it do anything for your computer or steal all your information or else without anti viruses like you have no police to keep this safe and peaceful. For us we study it we use it everyday because it’s my major and when you know how the attack happens to your computer and more small details you will be clever and know how to defend yourself against it. That is why you should learn a Little bit about kind of viruses.




Thursday, 25 February 2016

clo2

Computer viruses
LSS 2533 Research Methods
CLO 1 – Research Proposal







Khalid Akaabi
H00247641
CJM













Section 3 –– primary research questions.

Primary Sub-Questions
What are computer viruses in your words?

Secondary Question

Do ADMC students know the difference between types of virus?

Do you feel happy with dealing with computers daily in your work?

Do you feel absolutely safe when you have an antivirus in your computer?

Do you count on your computer and internet in your daily routine?

Do ADMC students know how to prevent this kind of virus?

Do you have antiviruses in your computer?

Do you have any untrusted program in your computer? 

Does anyone ever send you viruses?

Do you recognize viruses or not?



1- 60% of people chose all of the above, 30% of people chose piece of code and 10% of people chose malware program
2- 50% of people found that ADMC students don’t know difference and 50% think they know
3- 100 % feel happy dealing with their own computer in their work
4- 70% feel absolutely safe when they have antiviruses; 30% feel they are not absolutely safe
5- 80% count on computer and internet in daily routine and 20% do not count on it
6- 60% of people say that students can prevent most common viruses and 40% say they cannot
7- 90% of people say they have antiviruses in their computer and 10%  don’t
8- 70% of people say that they do not have untrusted program in their computer and 30%  have it 
9- 70% of people say that someone sent them a viruses in their computer and 30% say not
10-80% of people say that they can recognize viruses in their computer and 20% they said they can’t

Question Yes No
1 All of the above(60) Piece of code(30) 
Malware program(10)
2 (50) (50)
3 (100) (0)
4 (70) (30)
5 (80) (20)
6 (60) (40)
7 (90) (10)
8 (30) (70)
9 (70) (30)
10 (80) (20)

In my questionnaire I cover teacher and student from (IT) security and most of them was answering same answer and actually I agree with most simple that I take if you ask me personally I will be same of the simple that answer. I think it was like that because I collect answer from IT student and teacher and this the result I came up with. 

clo 1

Computer viruses
LSS 2533 Research Methods
CLO 1 – Research Proposal







Khalid Akaabi
H00247641
CJM



Page of contents
_____________________________________________________
1. Title page
2. Page of contents
3.         Introduction 
4. Section 1 – Mind map 
5. Section 2 – Background research report and justification.
6. Section 3 – primary research questions.

















Introduction:
First I will go to write a report about computer viruses. A computer virus is a computer program that is hidden within another program that is capable of reproducing copies of it and inserting them into other programs or files.  It is often attached to a software or document that a computer user receives.  When the software containing the virus is run or when the file is opened the virus may infect the computer’s software and cause damage.  Does Student in ADMC know how to deal with computer versus? 


















Section 1 – Mind map 






Section 2 – Background research report and justification.

Now days there are many malicious programs that can cause damage to your computer but there are differences among the viruses many kind many ways many problems I will talk a little about Viruses and where it come from, how it come and how to prevent it. First Viruses its small piece of software it attach itself to a program or file and as long as you click on it and send it to your friend you will help the hacker to have many prey or victim in our word now a days we call it (sheep).
Second Worms: computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided Computer worms are among the most common types of malware.
Third Dos/DDos: Denial of service are loaded of many request to the server (TCP/UDP) they try to request as much as possible request from the server to make it come down attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.  Distributed Denial of Service Attack In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs. a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
Fourth Trojan horse: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks
 
Fifth Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.
Sixth Logic bomb / Time bomb: like other viruses, logic bombs are designed to cause harm to your computer. Logic bombs, however, only trigger when specific conditions are met. For example a computer programmer may insert code into a payroll program that deletes files if her name is not found on the list. This means that files will be deleted if she is ever fired. A company named Omega Engineering lost millions of dollars as a result of a logic bomb left by a former employee.
Other viruses, called time bombs, may only detonate on a specific date or time. An example of this is the Jerusalem virus which, every Friday the 13th, deletes all the files on an infected computer. 
It’s recommended that you install anti-malware software on all of your devices – including PCs, laptops, Macs and smartphones – and that your anti-malware solution receives regular updates, in order to protect against the latest threats. A good anti-malware software product and always try to educated yourself a little bit about viruses.



Source: 

Beal, V. (2015, December 14). The Difference Between a Computer Virus, Worm and Trojan Horse. Retrieved February 01, 2016, from http://www.webopedia.com/DidYouKnow/Internet/virus.asp

Brain, M. (2012, June 1). How Computer Viruses Work. Retrieved February 01, 2016, from http://computer.howstuffworks.com/virus.htm

Beal, V. (2011, June 1). Computer virus (virus). Retrieved February 01, 2016, from http://www.webopedia.com/TERM/V/virus.html

Rouse, M. (2006, July 1). What is virus? - Definition from WhatIs.com. Retrieved February 01, 2016, from http://searchsecurity.techtarget.com/definition/virus











Section 3 –– primary research questions.

Primary Sub-Questions
What are computer viruses in your words?

Secondary Question

Do ADMC students know the difference between types of virus?

Do you feel happy with dealing with computers daily in your work?

Do you feel absolutely safe when you have an antivirus in your computer?

Tuesday, 16 February 2016

Viruses with question

Computer viruses
LSS 2533 Research Methods
CLO 1 – Research Proposal







Khalid Akaabi
H00247641
CJM



Page of contents
_____________________________________________________
1. Title page
2. Page of contents
3.         Introduction 
4. Section 1 – Mind map 
5. Section 2 – Background research report and justification.
6. Section 3 – primary research questions.

















Introduction:
First I will go to write a report about computer viruses. A computer virus is a computer program that is hidden within another program that is capable of reproducing copies of it and inserting them into other programs or files.  It is often attached to a software or document that a computer user receives.  When the software containing the virus is run or when the file is opened the virus may infect the computer’s software and cause damage.  Does Student in ADMC know how to deal with computer versus? 


















Section 1 – Mind map 






Section 2 – Background research report and justification.

Now days there are many malicious programs that can cause damage to your computer but there are differences among the viruses many kind many ways many problems I will talk a little about Viruses and where it come from, how it come and how to prevent it. First Viruses its small piece of software it attach itself to a program or file and as long as you click on it and send it to your friend you will help the hacker to have many prey or victim in our word now a days we call it (sheep).
Second Worms: computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided Computer worms are among the most common types of malware.
Third Dos/DDos: Denial of service are loaded of many request to the server (TCP/UDP) they try to request as much as possible request from the server to make it come down attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.  Distributed Denial of Service Attack In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs. a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
Fourth Trojan horse: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks
 
Fifth Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.
Sixth Logic bomb / Time bomb: like other viruses, logic bombs are designed to cause harm to your computer. Logic bombs, however, only trigger when specific conditions are met. For example a computer programmer may insert code into a payroll program that deletes files if her name is not found on the list. This means that files will be deleted if she is ever fired. A company named Omega Engineering lost millions of dollars as a result of a logic bomb left by a former employee.
Other viruses, called time bombs, may only detonate on a specific date or time. An example of this is the Jerusalem virus which, every Friday the 13th, deletes all the files on an infected computer. 
It’s recommended that you install anti-malware software on all of your devices – including PCs, laptops, Macs and smartphones – and that your anti-malware solution receives regular updates, in order to protect against the latest threats. A good anti-malware software product and always try to educated yourself a little bit about viruses.



Source: 

Beal, V. (2015, December 14). The Difference Between a Computer Virus, Worm and Trojan Horse. Retrieved February 01, 2016, from http://www.webopedia.com/DidYouKnow/Internet/virus.asp

Brain, M. (2012, June 1). How Computer Viruses Work. Retrieved February 01, 2016, from http://computer.howstuffworks.com/virus.htm

Beal, V. (2011, June 1). Computer virus (virus). Retrieved February 01, 2016, from http://www.webopedia.com/TERM/V/virus.html

Rouse, M. (2006, July 1). What is virus? - Definition from WhatIs.com. Retrieved February 01, 2016, from http://searchsecurity.techtarget.com/definition/virus











Section 3 –– primary research questions.

Primary Sub-Questions
What are computer viruses in your words?

Secondary Question

Do ADMC students know the difference between types of virus?

Do you feel happy with dealing with computers daily in your work?

Do you feel absolutely safe when you have an antivirus in your computer?

Do you count on your computer and internet in your daily routine?

Do ADMC students know how to prevent this kind of virus?

Do you have antiviruses in your computer?

Do you have any untrusted program in your computer? 

Does anyone ever send you viruses?

Do you recognize viruses or not?



1- 60% of people chose all of the above, 30% of people chose piece of code and 10% of people chose malware program
2- 50% of people found that ADMC students don’t know difference and 50% think they know
3- 100 % feel happy dealing with their own computer in their work
4- 70% feel absolutely safe when they have antiviruses; 30% feel they are not absolutely safe
5- 80% count on computer and internet in daily routine and 20% do not count on it
6- 60% of people say that students can prevent most common viruses and 40% say they cannot
7- 90% of people say they have antiviruses in their computer and 10%  don’t
8- 70% of people say that they do not have untrusted program in their computer and 30%  have it 
9- 70% of people say that someone sent them a viruses in their computer and 30% say not
10-80% of people say that they can recognize viruses in their computer and 20% they said they can’t

Question Yes No
1 All of the above(60) Piece of code(30) 
Malware program(10)
2 (50) (50)
3 (100) (0)
4 (70) (30)
5 (80) (20)
6 (60) (40)
7 (90) (10)
8 (30) (70)
9 (70) (30)
10 (80) (20)

In my questionnaire I cover teacher and student from (IT) security and most of them was answering same answer and actually I agree with most simple that I take if you ask me personally I will be same of the simple that answer. I think it was like that because I collect answer from IT student and teacher and this the result I came up with. 

Wednesday, 3 February 2016

Computer Viruses


Computer viruses
LSS 2533 Research Methods
CLO 1 – Research Proposal






Khalid Akaabi
H00247641
CJM



Page of contents
_____________________________________________________
1.        Title page
2.        Page of contents
3.         Introduction
4.        Section 1 – Mind map
5.        Section 2 – Background research report and justification.
6.        Section 3 – primary research questions.

















Introduction:
First I will go to write a report about computer viruses. A computer virus is a computer program that is hidden within another program that is capable of reproducing copies of it and inserting them into other programs or files.  It is often attached to a software or document that a computer user receives.  When the software containing the virus is run or when the file is opened the virus may infect the computer’s software and cause damage.  Does Student in ADMC know how to deal with computer versus?


















Section 1 – Mind map


 



Section 2 – Background research report and justification.

Now days there are many malicious programs that can cause damage to your computer but there are differences among the viruses many kind many ways many problems I will talk a little about Viruses and where it come from, how it come and how to prevent it. First Viruses its small piece of software it attach itself to a program or file and as long as you click on it and send it to your friend you will help the hacker to have many prey or victim in our word now a days we call it (sheep).
Second Worms: computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided Computer worms are among the most common types of malware.
Third Dos/DDos: Denial of service are loaded of many request to the server (TCP/UDP) they try to request as much as possible request from the server to make it come down attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.  Distributed Denial of Service Attack In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs. a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
Fourth Trojan horse: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:
·         Deleting data
·         Blocking data
·         Modifying data
·         Copying data
·         Disrupting the performance of computers or computer networks

Fifth Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.
Sixth Logic bomb / Time bomb: like other viruses, logic bombs are designed to cause harm to your computer. Logic bombs, however, only trigger when specific conditions are met. For example a computer programmer may insert code into a payroll program that deletes files if her name is not found on the list. This means that files will be deleted if she is ever fired. A company named Omega Engineering lost millions of dollars as a result of a logic bomb left by a former employee.
Other viruses, called time bombs, may only detonate on a specific date or time. An example of this is the Jerusalem virus which, every Friday the 13th, deletes all the files on an infected computer.
It’s recommended that you install anti-malware software on all of your devices – including PCs, laptops, Macs and smartphones – and that your anti-malware solution receives regular updates, in order to protect against the latest threats. A good anti-malware software product and always try to educated yourself a little bit about viruses.





Source:

Beal, V. (2015, December 14). The Difference Between a Computer Virus, Worm and Trojan Horse. Retrieved February 01, 2016, from http://www.webopedia.com/DidYouKnow/Internet/virus.asp

Brain, M. (2012, June 1). How Computer Viruses Work. Retrieved February 01, 2016, from http://computer.howstuffworks.com/virus.htm

Beal, V. (2011, June 1). Computer virus (virus). Retrieved February 01, 2016, from http://www.webopedia.com/TERM/V/virus.html

Rouse, M. (2006, July 1). What is virus? - Definition from WhatIs.com. Retrieved February 01, 2016, from http://searchsecurity.techtarget.com/definition/virus













Section 3 –– primary research questions.


Primary Sub-Questions
·        What are computer viruses in your words?


Secondary Question

·        Do ADMC students know the difference between types of virus kind and how to prevent that?

·        Do you feel happy with dealing with computer daily in your work?

·        Do you feel absolute safe when you have antivirus in your computer?

·        Do you count on your computer and internet in your daily day work?