Call 08068929770 for any enquiries.

Project Topic:

HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

Project Information:

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 62 ::   Attributes: Questionnaire, Data Analysis
::   177 people found this useful

Project Body:

CHAPTER ONE

INTRODUCTION

1.1   BACKGROUND TO THE STUDY

Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system (Higgins, 2010). Computer system infection is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. Organizations also face similar threats from a few forms of non-malware threats that are often associated with computer system infection. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Organizations should plan and implement an approach to computer system infection incident prevention based on the attack vectors that are most likely to be used currently and in the near future. Because the effectiveness of prevention techniques may vary depending on the environment (i.e., a technique that works well in a managed environment might be ineffective in a non-managed environment), organizations should choose preventive methods that are well-suited to their environment and hosts. An organization’s approach to computer system infection incident prevention should incorporate policy considerations, awareness programs for users and information technology (IT) staff, vulnerability and threat mitigation efforts, and defensive architecture considerations (Higgins, 2010).

An organization’s policy statements should be used as the basis for additional malware prevention efforts, such as user and IT staff awareness, vulnerability mitigation, threat mitigation, and defensive architecture. If an organization does not state consider system infection prevention considerations clearly in its policies, it is unlikely to perform infection prevention activities consistently and effectively throughout the organization (Goodin, 2007). Computer infection prevention–related policy should be as general as possible to provide flexibility in policy implementation and to reduce the need for frequent policy updates, but should also be specific enough to make the intent and scope of the policy clear. Computer system prevention–related policy should include provisions related to remote workers—both those using hosts controlled by the organization and those using hosts outside of the organization’s control (e.g., contractor computers, employees’ home computers, business partners’ computers, mobile devices).

Trojan has been building tools that you can trust for more than a century. It’s worthy to note that there’s no substitute for quality. These tools are used has antivirus. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of computer infection, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT) and botnet DDoS attacks (Harley, 2011).

Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.

1.2   STATEMENT OF THE PROBLEM

Computer infection incident containment has two major components: stopping the spread of infection and preventing further damage to hosts. Nearly every infection incident requires containment actions. In addressing an incident, it is important for an organization to decide which methods of containment to employ initially, early in the response. Organizations should have strategies and procedures in place for making containment-related decisions that reflect the level of risk acceptable to the organization. Containment strategies should support incident handlers in selecting the appropriate combination of containment methods based on the characteristics of a particular situation. This study is examining the method of preventing computer system infection and compromise using Trojan tool and process.

1.3   OBJECTIVES OF THE STUDY

The following are the objectives of this study:

  1. To examine the methods of preventing computer system infection.
  2. To determine the capability of Trojan tool and process in preventing computer system infection.
  3. To identify the consequences of computer system infection.

1.4   RESEARCH QUESTIONS

  1. What are the methods of preventing computer system infection?
  2. What is the capability of Trojan tool and process in preventing computer system infection?
  3. What are the consequences of computer system infection?

1.5 RESEARCH HYPOTHESIS

H0: Anti-virus programs are not always effective against new viruses

H1: Anti-virus programs are always effective against new viruses

1.6   SIGNIFICANCE OF THE STUDY

The following are the significance of this study:

  1. The outcome of this study will educate computer users and the general public on the issues of computer system infection. It will also educate on how to prevent computer system infection and compromise using Trojan tools and process.
  2. This research will be a contribution to the body of literature in the area of the effect of personality trait on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY

This study will cover the method of preventing computer system infection using Trojan tools and process.

LIMITATION OF STUDY

Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).

 Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work

 

REFERENCES

Higgins, J.K. (2010). "New Microsoft Forefront Software Runs Five Antivirus Vendors' Engines". Darkreading. Retrieved 2011-02-24.

Goodin, D (2007). "Anti-virus protection gets worse". Channel Register. Retrieved 2011-02-24.

Harley, D. (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN 9780080558660. Retrieved 2013-06-10

Project Department:

MORE COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS


Get The Complete Project »

Instantly Share this Project On Social Media:

CLOSELY RELATED COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATIONS IN ABUJA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 61 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   284 engagements

CHAPTER ONE 1.1. BACKGROUND OF THE STUDY A database is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically o...Continue reading »

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   223 engagements

CHAPTER ONE 1.1. Background to the Study Made-in-Nigeria softwares are those that are produced within Nigeria. Nigeria as a third world country needs to produce its own software so that it will help...Continue reading »

AN APPRAISAL OF THE ROLE OF ICT AS A CHANGE AGENT FOR QUALITY EDUCATION IN TERTIARY INSTITUTION IN NIGERIA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 64 ::   Attributes: Questionnaire, Data Analysis,Abstract

CHAPTER ONE INTRODUCTION 1.1. BACKGROUND OF THE STUDY Quality assurance in the education system is a concept consisting of lot of activities that are designed to improve the quality of input, proce...Continue reading »

ASSESSMENT OF THE UTILIZATION OF INTERNET SERVICES AMONG STUDENTS IN FEDERAL INSTITUTIONS IN KADUNA STATE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 69 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   364 engagements

CHAPTER ONE INTRODUCTION The convergence of information and communication technologies as typified by the Internet is increasingly having more influence on all aspects of the society as it has becom...Continue reading »

AUTOMATED DATA ANALYSIS OF LABORATORY TEST RESULTS AND ITS SCIENTIFIC IMPORTANCE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 59 ::   Attributes: Sort code, Abstract  ::   240 engagements

CHAPTER ONE 1.1. Introduction As an authentic measure to curb mortality rate, it is important to know the diseases that contribute to increasing mortality rate. Laboratory test results provide inform...Continue reading »

AUTOMATED MARKET BASKET ANALYSIS SYSTEM

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Sort code, Abstract  ::   220 engagements

CHAPTER ONE 1.0 INTRODUCTION Data mining is described as the extraction of hidden helpful information from a collection of huge databases, data mining is also a technique that encompasses an enormou...Continue reading »

What are you looking for today?

WHAT OUR CUSTOMERS ARE SAYING:

  • 1. Rita Eze from abia state university said "thank you so much for your sincerity; i will tell my friends about you guys.".
    Rating: Very Good
  • 2. JULIET from UNIMAID said "I THANK YOU GUYS FOR BEING HONEST.....I WILL TELL MY FRIENDS ABOUT YOU GUYS. THANKX SO MUCH".
    Rating: Excellent
  • 3. Lilian Terdoo from BSU said "i have nothing to say but thanx for being honest. i appreciate u guys...".
    Rating: Very Good
  • 4. Demien Johnson from UNN said "Uniprojectmaterials is a blessing to researchers. my job was eased up by you guys. your jobs have good quality and was delivered on time to me. Thanks a million times".
    Rating: Very Good
  • 5. Patience from unilag said "i was having difficulties handling my dissertation of 12000 words. until i stumbled on uniprojectmaterials, my work was ready in three days with high quality write up and excellent data analysis, i will tell all my friends about u guys. Mr Donald is a very nice person, he should be in charge of the phone. he attended to me very well. God bless. ".
    Rating: Excellent
  • 6. James Ike from College of Education, Gindiri said "Great delivery. Una dey try wella!!!".
    Rating: Excellent

Paper Information

Format:ms word
Chapter:1-5
Pages:62
Attribute:Questionnaire, Data Analysis
Price:₦3,000
Get The Complete Project »

Best Selling Projects