Computer viruses
LSS 2533 Research Methods
CLO 1 – Research Proposal
Khalid Akaabi
H00247641
CJM
Page of contents
_____________________________________________________
1. Title
page
2. Page
of contents
3. Introduction
4. Section
1 – Mind map
5. Section
2 – Background research report and justification.
6. Section 3 –
primary research questions.
Introduction:
First I will go to write a report about
computer viruses. A computer virus is a computer program that is hidden within
another program that is capable of reproducing copies of it and inserting them
into other programs or files. It is
often attached to a software or document that a computer user receives. When the software containing the virus is run
or when the file is opened the virus may infect the computer’s software and
cause damage. Does Student in ADMC know
how to deal with computer versus?
Section 1 – Mind map
Section
2 – Background research report and justification.
Now days there are many malicious programs that can cause damage to
your computer but there are differences among the viruses many kind many ways
many problems I will talk a little about Viruses and where it come from, how it
come and how to prevent it. First Viruses its small piece of software it attach
itself to a program or file and as long as you click on it and send it to your friend
you will help the hacker to have many prey
or victim in our word now a days we call it (sheep).
Second Worms: computer worms are similar to
viruses in that they replicate functional copies of themselves and can
cause the same type of damage. In contrast to viruses, which require the
spreading of an infected host file, worms are standalone software and do not
require a host program or human help to propagate. To spread, worms either
exploit vulnerability on the target system or use some kind of social
engineering to trick users into executing them. A worm enters a computer
through vulnerability in the system and takes advantage of file-transport or
information-transport features on the system, allowing it to travel unaided
Computer worms are among the most common types of malware.
Third Dos/DDos: Denial of service are loaded
of many request to the server (TCP/UDP) they try to request as much as possible
request from the server to make it come down attack is to overload the targeted server’s bandwidth and
other resources. This will make the server inaccessible to others, thereby
blocking the website or whatever else is hosted there. Distributed Denial of
Service Attack
In most respects it is similar to a DoS attack but the results are much, much
different. Instead of one computer and one internet connection the DDoS
attack utilises many computers and many connections. The computers behind
such an attack are often distributed around the whole world and will be part of
what is known as a botnet. The main difference between a
DDoS attack vs. a DoS attack, therefore, is that the target server will be
overload by hundreds or even thousands of requests in the case of the former as
opposed to just one attacker in the case of the latter.
Fourth
Trojan horse: A
Trojan horse or Trojan is a type of malware that is often disguised as
legitimate software. Trojans can be employed by cyber-thieves and hackers
trying to gain access to users systems. Users are typically tricked by some
form of social engineering into loading and executing Trojans on their systems.
Once activated, Trojans can enable cyber-criminals to spy on you, steal your
sensitive data, and gain backdoor access to your system. These actions can include:
·
Deleting
data
·
Blocking
data
·
Modifying
data
·
Copying
data
·
Disrupting
the performance of computers or computer networks
Fifth Spyware: Any software that covertly
gathers user information through the user's Internet connection without his or
her knowledge, usually for advertising purposes. Spyware applications are
typically bundled as a hidden component of freeware or shareware programs that
can be downloaded from the Internet; however, it should be noted that the
majority of shareware and freeware applications do not come with spyware. Once
installed, the spyware monitors user activity on the Internet and transmits
that information in the background to someone else. Spyware can also gather
information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in
that users unwittingly install the product when they install something else. A
common way to become a victim of spyware is to download certain peer-to-peer file
swapping products that are available today.
Sixth Logic bomb / Time bomb: like other
viruses, logic bombs are designed to cause harm to your computer. Logic bombs,
however, only trigger when specific conditions are met. For example a computer
programmer may insert code into a payroll program that deletes files if her
name is not found on the list. This means that files will be deleted if she is
ever fired. A company named Omega Engineering lost millions of dollars as a
result of a logic bomb left by a former employee.
Other viruses, called time bombs, may
only detonate on a specific date or time. An example of this is the Jerusalem
virus which, every Friday the 13th, deletes all the files on an infected
computer.
It’s recommended that you install anti-malware software
on all of your devices – including PCs, laptops, Macs and smartphones – and
that your anti-malware solution receives regular updates, in order to protect
against the latest threats. A good anti-malware software product and always try
to educated yourself a little bit about viruses.
Source:
Beal, V. (2015, December 14). The Difference Between a
Computer Virus, Worm and Trojan Horse. Retrieved February 01, 2016, from
http://www.webopedia.com/DidYouKnow/Internet/virus.asp
Brain, M. (2012, June 1). How Computer Viruses Work.
Retrieved February 01, 2016, from http://computer.howstuffworks.com/virus.htm
Beal, V. (2011, June 1). Computer virus (virus). Retrieved
February 01, 2016, from http://www.webopedia.com/TERM/V/virus.html
Rouse, M. (2006, July 1). What is virus? - Definition from
WhatIs.com. Retrieved February 01, 2016, from http://searchsecurity.techtarget.com/definition/virus
Section 3 ––
primary research questions.
Primary
Sub-Questions
·
What are computer viruses in your words?
Secondary Question
·
Do ADMC students know the difference between types of virus kind and
how to prevent that?
·
Do you feel happy with dealing with computer daily in your work?
·
Do you feel absolute safe when you have antivirus in your computer?
·
Do you count on your computer and internet in your daily day work?
No comments:
Post a Comment