HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS


1,807 marked this research material reliable.
Call or whatsapp: +2347063298784 or email: info@allprojectmaterials.com
Department: computer science project topics | Type: Project topics and materials | Format: Ms Word, PDF | Attribute: Documentation Only | Pages: 62 Pages | Chapters: 1-5 chapters | Inclusive: Abstract and Table of Contents


HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

PROJECT TOPICS AND MATERIALS ON HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS


CHAPTER ONE

INTRODUCTION

1.1   BACKGROUND TO THE STUDY

Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system (Higgins, 2010). Computer system infection is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. Organizations also face similar threats from a few forms of non-malware threats that are often associated with computer system infection. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Organizations should plan and implement an approach to computer system infection incident prevention based on the attack vectors that are most likely to be used currently and in the near future. Because the effectiveness of prevention techniques may vary depending on the environment (i.e., a technique that works well in a managed environment might be ineffective in a non-managed environment), organizations should choose preventive methods that are well-suited to their environment and hosts. An organization’s approach to computer system infection incident prevention should incorporate policy considerations, awareness programs for users and information technology (IT) staff, vulnerability and threat mitigation efforts, and defensive architecture considerations (Higgins, 2010).

An organization’s policy statements should be used as the basis for additional malware prevention efforts, such as user and IT staff awareness, vulnerability mitigation, threat mitigation, and defensive architecture. If an organization does not state consider system infection prevention considerations clearly in its policies, it is unlikely to perform infection prevention activities consistently and effectively throughout the organization (Goodin, 2007). Computer infection prevention–related policy should be as general as possible to provide flexibility in policy implementation and to reduce the need for frequent policy updates, but should also be specific enough to make the intent and scope of the policy clear. Computer system prevention–related policy should include provisions related to remote workers—both those using hosts controlled by the organization and those using hosts outside of the organization’s control (e.g., contractor computers, employees’ home computers, business partners’ computers, mobile devices).

Trojan has been building tools that you can trust for more than a century. It’s worthy to note that there’s no substitute for quality. These tools are used has antivirus. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of computer infection, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT) and botnet DDoS attacks (Harley, 2011).

Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.

1.2   STATEMENT OF THE PROBLEM

Computer infection incident containment has two major components: stopping the spread of infection and preventing further damage to hosts. Nearly every infection incident requires containment actions. In addressing an incident, it is important for an organization to decide which methods of containment to employ initially, early in the response. Organizations should have strategies and procedures in place for making containment-related decisions that reflect the level of risk acceptable to the organization. Containment strategies should support incident handlers in selecting the appropriate combination of containment methods based on the characteristics of a particular situation. This study is examining the method of preventing computer system infection and compromise using Trojan tool and process.

1.3   OBJECTIVES OF THE STUDY

The following are the objectives of this study:

1.  To examine the methods of preventing computer system infection.

2.  To determine the capability of Trojan tool and process in preventing computer system infection.

3.  To identify the consequences of computer system infection.

1.4   RESEARCH QUESTIONS

1.  What are the methods of preventing computer system infection?

2.  What is the capability of Trojan tool and process in preventing computer system infection?

3.  What are the consequences of computer system infection?

1.5 RESEARCH HYPOTHESIS

H0: Anti-virus programs are not always effective against new viruses

H1: Anti-virus programs are always effective against new viruses

1.6   SIGNIFICANCE OF THE STUDY

The following are the significance of this study:

1.  The outcome of this study will educate computer users and the general public on the issues of computer system infection. It will also educate on how to prevent computer system infection and compromise using Trojan tools and process.

2.  This research will be a contribution to the body of literature in the area of the effect of personality trait on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY

This study will cover the method of preventing computer system infection using Trojan tools and process.

LIMITATION OF STUDY

Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).

 Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work

 

REFERENCES

Higgins, J.K. (2010). "New Microsoft Forefront Software Runs Five Antivirus Vendors' Engines". Darkreading. Retrieved 2011-02-24.

Goodin, D (2007). "Anti-virus protection gets worse". Channel Register. Retrieved 2011-02-24.

Harley, D. (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN 9780080558660. Retrieved 2013-06-10

DOWNLOAD COMPLETE WORK FOR HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS


Additional Information

  • The Project Material is available for download.
  • The Research material is delivered within 15-30 Minutes.
  • The Material is complete from Preliminary Pages to References.
  • Well Researched and Approved for supervision.
  • Click the download button below to get the complete project material.

Frequently Asked Questions

In-order to give you the best service available online, we have compiled frequently asked questions (FAQ) from our clients so as to answer them and make your visit much more interesting.

We are proudly Nigerians, and we are well aware of fraudulent activities that has been ongoing in the internet. To make it well known to our customers, we are geniune and duely registered with the Corporate Affairs Commission of the republic of Nigeria. Remember, Fraudulent sites can NEVER post bank accounts or contact address which contains personal information. Free chapter One is always given on the site to prove to you that we have the material. If you are unable to view the free chapter 1 send an email to info@researchcub.info with the subject head "FREE CHAPTER 1' plus the topic. You will get a free chapter 1 within an hour. You can also check out what our happy clients have to say.


Students are always advised to use our materials as guide. However, if you have a different case study, you may need to consult one of our professional writers to help you with that. Depending on similarity of the organization/industry you may modify if you wish.


We have professional writers in various disciplines. If you have a fresh topic, just click Hire a Writer or click here to fill the form and one of our writers will contact you shortly.


Yes it is a complete research project. We ensure that our client receives complete project materials which includes chapters 1-5, full references, questionnaires/secondary data, etc.


Depending on how fast your request is acknowledged by us, you will get the complete project material withing 15-30 minutes. However, on a very good day you can still get it within 5 minutes!

What Clients Say

Our Researchers are happy, see what they are saying. Share your own experience with the world.
Be polite and honest, as we seek to expand our business and reach more people. Thank you.

A Research proposal for how to prevent computer system infection and compromise using trojan tool and process:
Reviews: A Review on how to prevent computer system infection and compromise using trojan tool and process, prevent, computer, system project topics, researchcub.info, project topic, list of project topics, research project topics, journals, books, Academic writer.
Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system (Higgins, 2010). Computer system infection is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations... computer science project topics

HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

Project Information

Share Links

Download Post (MsWord)
Download Post (PDF)

Search for Project Topics

Project topics in Departments

Do you need a writer for your academic work?
Undergraduate Project Topics, economics project topics, marketing project topics, business administration project topics, engineering project topics, computer science project topics, banking & finance project topics, education project topics, law project topics, sciences project topics, public administration project topics, political science project topics, mathematics project topics, medical science project topics, mass communication project topics, research projects, geology project topics, marketing project topics, agriculture project topics, Browse Thousands of Final Year Project Topics, hire a writer, Research Works and Materials, Project topics and materials in Nigeria, Undergraduate Project Topics, Research Works and Materials, research topics, research project materials, complete project materials, computer science project material, free project topics, complete projects, accounting topics, small business topics, entrepreneurship topics, project materials, Nigerian undergraduate projects, business administration projects, computer science topics and projects, MBA Nigerian project topics, human resources, small businesses, entrepreneurship projects, economics projects, impacts projects, effect projects, university projects, polytechnic projects, investigate projects, political science projects, mass communication projects, project topics, human resource projects, education projects, French topics, project analysis, French projects, project tips, project abstract, project proposals, project bibliography, project reference, project seminar, forex, TSA, treasury single account, currency, naira, devaluation, undergraduate projects, final project research, marketing project topics, statistics project topics, mathematics project topics, statistics, mathematics, research projects, project thesis, labour force theses, NCE, OND, HND, BTECH, BSC, MBA, MSC, English projects, linguistic project topics, Free Project topics and materials in Nigeria, research topics, reseach project materials, computer science project material, free, complete, accounting topics, small business topics, materials, nigeria projects, business administration projects, computer science topics and projects, MBA nigeria project topics, human resources, small business, entrepreneurship projects, economics projects, impact projects, effects projects, training, budgets, ghana, university, polytechnic, browse Free project materials and topics in Nigeria, accounting and finance project materials, business administration project materials and topics, human resources, entrepreneurship, computer science and engineering project materials and topics, Accounting project topics, Accounting project topics and materials, Agricultural Economics Project Topics and Materials, Agricultural Science Projects topics and materials, All Project topics and materials, Architecture Project topics and materials, Aviation project topics and materials, Banking & Finance Projects topics and materials, Biology project and materials, Building project topics and materials, Business Administration & Management Projects topics and materials, Chemical Engineering Project Topics and materials, Civil Engineering Projects topics and materials, Communication & mass communication art project topics and materials, Computer Engineering Project Topics and materials, Computer Science Projects topics and materials, Criminology project topics and materials, Economics Research Projects topics and materials, Education Project Topics and Materials, Electrical Engineering Projects and materials, English Education & English Language Project topics and materials, Food Science project topics and materials, Geology Project Topics and materials, Guidance Counseling Project Topics and materials, History project topics and materials, Home Economics Project Topics and Materials, Human Resource Projects topics and Materials, Industrial Chemistry Projects topics and materials, Insurance Projects topics and materials, Law project topics and materials, Library and information science project topics and materials, Marine and Transport management project topics and materials, Marketing Projects topics and materials, Mathematics project topics and materials, Medical Sciences Project Topics and materials, Microbiology project topics and materials, Nursing and Midwifery project topics, Nursing and Midwifery project topics and materials, Optometry or nursing project topics and materials, Petroleum Engineering project topics and materials, Pharmacy project topics and materials, Philosophy project topics and materials, Photography project topics and materials, Physical and Health Education project topics and materials, Physiology project topics and materials, Political science project topics and materials, Project topics and materials, Psychology project topics and materials, Random project, Religious and Cultural Studies Project Topics and Materials, Sociology and Anthropology Project topics and materials, Sociology Project Topics and materials, Tourism project topics and materials, Vocational education project topics and materials. Project Topics: List of Project Topics | how to prevent computer system infection and compromise using trojan tool and process | prevent | computer | system Project Topics | researchcub.info