Computer viruses
LSS 2533
Research Methods
CLO 3 –
Research Proposal
Khalid Akaabi
H00247641
CJM
Contents • Justification • Background report summary • Data collection procedures • Research questions and results • Discussion of the results Justification: This topic will be very helpful for those people who don't know the difference between viruses and how to protect your computer from it. Many old people like my friend or brother who just does work on a personal computer and use it just for work time to do work but there are many reasons why I do about computer viruses because there are many people are not yet awake to the danger that is coming and they have to know a little bit about it to try to defend themselves against this kind of danger and protect themselves. And I will try my best to make you know the difference between viruses. Background report summary Introduction: Nowadays there are many viruses and a malwares programs around you and you have much vulnerability that hackers can use to gain information from you so you have to know the different kinds of virus and how to protect yourself against hackers.In this report we describ computer viruses and how to protact your computer against them. And we justify this topic from the real life. Kind of Viruses: Viruses and worms are the same; the only difference is that worms can replicate themselves to many contact emails or users you have the only difference is worms do not replicate them selves but both can make same damage to you. Dos/DDos are a way to send a lot of requests to your server/system by sending many requests and trying to bring your system down by requesting many service DOS and DDOS; in DOS you send it by yourself but with DDOS you use many user systems called zombies to help you in sending requests. Trojan Horse and Spyware Trojan horse a malwares programs in your computer hackers use it a lot to open ports in your system, copying data, modifying, blocking data and deleting data so it can access your system or change data delete copy it so harms and spyware its same type of malware that installed on a computer without your knowledge of the owner the difference between them ;spyware can replicate itself and Trojan horse cannot do that by itself. Llike other viruses, logic bombs are designed to cause harm to your computer. Logic bombs, however, only trigger when specific conditions are met. For example a computer programmer may insert code into a payroll program that deletes files if her name is not found on the list. This means that files will be deleted if she is ever fired. A company named Omega Engineering lost millions of dollars as a result of a logic bomb left by a former employee. Other viruses, called time bombs, may only detonate on a specific date or time. An example of this is the Jerusalem virus which, every Friday the 13th, deletes all the files on an infected computer. Data collection procedures The primary data collection is the way to collect data from people using questionnair. The number of questions are 10 different questions that talk about my subject, which is computer viruses. I try to make question bettwen IT student and teacher to have really good answer and predused in chart and persentge scheduled all 10 student and teacher participating in and thanks to them a lot. Research Questionnaires Primary Sub-Questions • What are computer viruses in your words? 1- Malware program 2- Trojan horse 3- all of the above Secondary Question • Do ADMC students know the difference between types of virus? • Do you feel happy with dealing with computers daily in your work? • Do you feel absolutely safe when you have an antivirus in your computer? • Do you count on your computer and internet in your daily routine? • Do ADMC students know how to prevent this kind of virus? • Do you have antiviruses in your computer? • Do you have any untrusted program in your computer? • Does anyone ever send you viruses? • Do you recognize viruses or not? Result: | ||||
1- 60% of people chose all of the above, 30% of people chose A text file and 10% of people chose malware program 2- 50% of people found that ADMC students don’t know difference and 50% think they know 3- 100 % feel happy dealing with their own computer in their work 4- 70% feel absolutely safe when they have antiviruses; 30% feel they are not absolutely safe 5- 80% count on computer and internet in daily routine and 20% do not count on it 6- 60% of people say that students can prevent most common viruses and 40% say they cannot 7- 90% of people say they have antiviruses in their computer and 10% don’t 8- 70% of people say that they do not have untrusted program in their computer and 30% have it 9- 70% of people say that someone sent them a viruses in their computer and 30% say not 10-80% of people say that they can recognize viruses in their computer and 20% they said they can’t Questioner data result and discussion My opinion: After I collect the results of my questioner I cover In my questionnaire teacher and student from (IT) security and most of them were answering same answer and actually I agree with most with most of it if you ask me personally I will be same of the people that participate to answer. I came up with viruses can be send it to other client by internet or physical and have many kind of viruses that you should know what this kind and when it use and why and how to protect yourself. Conclusion Finally you have to use anti viruses to detect this kind and viruses and block it right in time before it do anything for your computer or steal all your information or else without anti viruses like you have no police to keep this safe and peaceful. For us we study it we use it everyday because it’s my major and when you know how the attack happens to your computer and more small details you will be clever and know how to defend yourself against it. That is why you should learn a Little bit about kind of viruses. |