Thursday, 25 February 2016

clo 1

Computer viruses
LSS 2533 Research Methods
CLO 1 – Research Proposal







Khalid Akaabi
H00247641
CJM



Page of contents
_____________________________________________________
1. Title page
2. Page of contents
3.         Introduction 
4. Section 1 – Mind map 
5. Section 2 – Background research report and justification.
6. Section 3 – primary research questions.

















Introduction:
First I will go to write a report about computer viruses. A computer virus is a computer program that is hidden within another program that is capable of reproducing copies of it and inserting them into other programs or files.  It is often attached to a software or document that a computer user receives.  When the software containing the virus is run or when the file is opened the virus may infect the computer’s software and cause damage.  Does Student in ADMC know how to deal with computer versus? 


















Section 1 – Mind map 






Section 2 – Background research report and justification.

Now days there are many malicious programs that can cause damage to your computer but there are differences among the viruses many kind many ways many problems I will talk a little about Viruses and where it come from, how it come and how to prevent it. First Viruses its small piece of software it attach itself to a program or file and as long as you click on it and send it to your friend you will help the hacker to have many prey or victim in our word now a days we call it (sheep).
Second Worms: computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided Computer worms are among the most common types of malware.
Third Dos/DDos: Denial of service are loaded of many request to the server (TCP/UDP) they try to request as much as possible request from the server to make it come down attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.  Distributed Denial of Service Attack In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs. a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
Fourth Trojan horse: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks
 
Fifth Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.
Sixth Logic bomb / Time bomb: like other viruses, logic bombs are designed to cause harm to your computer. Logic bombs, however, only trigger when specific conditions are met. For example a computer programmer may insert code into a payroll program that deletes files if her name is not found on the list. This means that files will be deleted if she is ever fired. A company named Omega Engineering lost millions of dollars as a result of a logic bomb left by a former employee.
Other viruses, called time bombs, may only detonate on a specific date or time. An example of this is the Jerusalem virus which, every Friday the 13th, deletes all the files on an infected computer. 
It’s recommended that you install anti-malware software on all of your devices – including PCs, laptops, Macs and smartphones – and that your anti-malware solution receives regular updates, in order to protect against the latest threats. A good anti-malware software product and always try to educated yourself a little bit about viruses.



Source: 

Beal, V. (2015, December 14). The Difference Between a Computer Virus, Worm and Trojan Horse. Retrieved February 01, 2016, from http://www.webopedia.com/DidYouKnow/Internet/virus.asp

Brain, M. (2012, June 1). How Computer Viruses Work. Retrieved February 01, 2016, from http://computer.howstuffworks.com/virus.htm

Beal, V. (2011, June 1). Computer virus (virus). Retrieved February 01, 2016, from http://www.webopedia.com/TERM/V/virus.html

Rouse, M. (2006, July 1). What is virus? - Definition from WhatIs.com. Retrieved February 01, 2016, from http://searchsecurity.techtarget.com/definition/virus











Section 3 –– primary research questions.

Primary Sub-Questions
What are computer viruses in your words?

Secondary Question

Do ADMC students know the difference between types of virus?

Do you feel happy with dealing with computers daily in your work?

Do you feel absolutely safe when you have an antivirus in your computer?

No comments:

Post a Comment