HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS


Department Of Information Technology


PAGES: 50
FORMAT: MS WORD
Chapters: 1-5
PRICE: ₦ 5,000.00

HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

TABLE OF CONTENT

Title Page………………..i

Certification……………ii

Dedication………………iii

Acknowledgment……….iv

Abstract…………………vi

Table of content………vii

CHAPTER ONE

INTRODUCTION

1.1    BACKGROUND TO THE STUDY

1.2    STATEMENT OF THE PROBLEM

1.3    OBJECTIVES OF THE STUDY

1.4    RESEARCH QUESTIONS

1.5 RESEARCH HYPOTHESIS

1.6    SIGNIFICANCE OF THE STUDY

1.7    SCOPE/LIMITATIONS OF THE STUDY

LIMITATION OF STUDY

REFERENCES

CHAPTER TWO

LITERATURE REVIEW

REFERENCES

CHAPTER THREE

RESEARCH METHODOLOGY

3.1    Research Design

3.2     The Study Area

3.3    Population of the Study

3.4    Sample Size and Sampling Techniques

3.5 Sources of Data Collection

3.6 Instrument for Data Collection

3.7    Validity of Research Instrument

3.8    Reliability of the Instrument

3.9    Administration of the Instrument

3.10    Method of Data Analysis

 3.11    Decision Rule

CHAPTER FOUR

DATA PRESENTATION, ANALYSIS, AND INTERPRETATION

BIODATA OF RESPONDENTS

RESEARCH HYPOTHESIS

CONCLUSION

CHAPTER FIVE

5.0 SUMMARY CONCLUSION AND RECOMMENDATION

FINDINGS

CONCLUSION AND RECOMMENDATION

APPENDIX 1

QUESTIONNAIRE ADMINISTRATION

CHAPTER ONE

INTRODUCTION

1.1   BACKGROUND TO THE STUDY

Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system (Higgins, 2010). Computer system infection is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. Organizations also face similar threats from a few forms of non-malware threats that are often associated with computer system infection. One of these forms that have become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Organizations should plan and implement an approach to computer system infection incident prevention based on the attack vectors that are most likely to be used currently and in the near future. Because the effectiveness of prevention techniques may vary depending on the environment (i.e., a technique that works well in a managed environment might be ineffective in a non-managed environment), organizations should choose preventive methods that are well-suited to their environment and hosts. An organization’s approach to computer system infection incident prevention should incorporate policy considerations, awareness programs for users and information technology (IT) staff, vulnerability and threat mitigation efforts, and defensive architecture considerations (Higgins, 2010).

An organization’s policy statements should be used as the basis for additional malware prevention efforts, such as user and IT staff awareness, vulnerability mitigation, threat mitigation, and defensive architecture. If an organization does not state consider system infection prevention considerations clearly in its policies, it is unlikely to perform infection prevention activities consistently and effectively throughout the organization (Goodin, 2007). Computer infection prevention–related policy should be as general as possible to provide flexibility in policy implementation and to reduce the need for frequent policy updates, but should also be specific enough to make the intent and scope of the policy clear. Computer system prevention-related policy should include provisions related to remote workers—both those using hosts controlled by the organization and those using hosts outside of the organization’s control (e.g., contractor computers, employees’ home computers, business partners’ computers, mobile devices).

Trojan has been building tools that you can trust for more than a century. It’s worthy to note that there’s no substitute for quality. These tools are used as antivirus. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of computer infections, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), and botnet DDoS attacks (Harley, 2011).

Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.

1.2   STATEMENT OF THE PROBLEM

Computer infection incident containment has two major components: stopping the spread of infection and preventing further damage to hosts. Nearly every infection incident requires containment actions. In addressing an incident, it is important for an organization to decide which methods of containment to employ initially, early in the response. Organizations should have strategies and procedures in place for making containment-related decisions that reflect the level of risk acceptable to the organization. Containment strategies should support incident handlers in selecting the appropriate combination of containment methods based on the characteristics of a particular situation. This study is examining the method of preventing computer system infection and compromise using Trojan tools and processes.

1.3   OBJECTIVES OF THE STUDY

The following are the objectives of this study:

To examine the methods of preventing computer system infection. To determine the capability of the Trojan tool and process in preventing computer system infection. To identify the consequences of computer system infection.

1.4   RESEARCH QUESTIONS

What are the methods of preventing computer system infection? What is the capability of the Trojan tool and process in preventing computer system infection? What are the consequences of computer system infection?

1.6   SIGNIFICANCE OF THE STUDY

The following are the significance of this study:

The outcome of this study will educate computer users and the general public on the issues of computer system infection. It will also educate on how to prevent computer system infection and compromise using Trojan tools and processes. This research will be a contribution to the body of literature in the area of the effect of personality traits on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY

This study will cover the method of preventing computer system infection using Trojan tools and processes.

LIMITATION OF STUDY

Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature, or information and in the process of data collection (internet, questionnaire, and interview).

 Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted to the research work

REFERENCES

Higgins, J.K. (2010). "New Microsoft Forefront Software Runs Five Antivirus Vendors' Engines". Dark Reading. Retrieved 2011-02-24.

Goodin, D (2007). "Anti-virus protection gets worse". Channel Register. Retrieved 2011-02-24.

Harley, D. (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN 9780080558660. Retrieved 2013-06-10

.



TYPE IN YOUR TOPIC OR KEYWORD AND CLICK SEARCH:





HOW TO GET YOUR COMPLETE PROJECT MATERIAL INSTANTLY

  • * Select 3 free project topics of your choice from your Department

    * Submit the 3 project topics to your Supervisor for his or her Approval

    * Call our 24/7 customer service desk or WhatsApp Chat# (+234) 0803-766-4978 and get your project topics and complete material instantly.

    * You can also send an Email to [email protected]

    * All project materials on this website are well researched by professionals with high level of professionalism.


TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.


  • Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.

    "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

  • Hilary Yusuf, United States International University Africa, Nairobi, Kenya.

    "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

  • Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.

    "Researchwap.net is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.net" and God bless you and your business! ."

  • Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.

    "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

  • Sampson, University of Nigeria, Nsukka.

    "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

  • Cynthia, Akwa Ibom State University .

    "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

  • Elizabeth, Obafemi Awolowo University

    "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

  • Ali Olanrewaju, Lagos State University.

    "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

  • Willie Ekereobong, University of Port Harcourt.

    "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

  • Theressa, Igbinedion University.

    "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 5k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

  • Joseph, Abia state Polytechnic.

    "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

  • Christiana, Landmark University .
    Christiana, Landmark University .

    "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

  • Musa, Federal University of Technology Minna

    "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

  • Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.

    "I was scared at first when I saw your website but I decided to risk my last 5k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."


  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.
    Thank you for choosing researchwap.com.


PROJECT DETAILS

PAGES: 50
FORMAT: MS WORD
Chapters: 1-5
PRICE: ₦ 5,000.00


TYPE TOPIC OR KEYWORD AND CLICK SEARCH:

FREQUENTLY ASKED QUESTIONS


  • 1. How can I get the complete project if I order?

    AFTER FOLLOWING THE PAYMENT PROCEDURES HERE, AND WE RECEIVE YOUR DETAILS AS SMS ON 08037664978 or as mail to [email protected], THE MATERIAL WILL BE ATTACHED AND MAILED TO YOUR EMAIL ADDRESS WITHIN 30 MINUTES, AND A NOTIFICATION OF THE DELIVERY WILL BE SENT TO YOUR PHONE NUMBER.

    2. How will my payment be confirmed?

    FOLLOW THE PAYMENT INSTRUCTIONS FOUND ON THE PAYMENTS PAGE. NOTE: Payment information is required for Payment Confirmation.

    3. One of your topics suites my project, but the case study is different. What step should I take?

    Students are always advised to use our materials as guide. However, if you have a different case study, you may need to consult researchwap.com Depending on similarity of the organization/industry (case study) you may modify to, if you wish.

    4. How long does it take to get the complete project?

    Depending on how fast your payment and details is acknowledged by us, you will get the complete project within 30 minutes. However, on a very good day you can still get it within 15 minutes!

    5. Why should I trust this website?

    We are well aware of fraudulent activities (scam) that have been happening on the internet. It is unfortunate, but hopefully declining. However, we wish to re-assure our esteemed clients that we are genuine and our services is authentic, if not, we would not post our account details, email address, phone number or any personal details that could be traceable. Free chapter 1 is always given on the site to prove to you that we got the material. If you are unable to view the free chapter 1 send an email or SMS containing your name, topic, with the subject head "FREE CHAPTER 1" to [email protected] or 08037664978 plus the topic. You will get the free chapter 1 within an hour.

    6. Do you accept ATM payments and Online Transfers?

    Yes. We accept ATM transfers and online payments. FOLLOW THE PAYMENT INSTRUCTIONS FOUND ON THE PAYMENTS PAGE.

    7. Is it a complete research project or just materials?

    Yes it is a complete research project. We send complete project materials (i.e. chapters 1-5, full references, and questionnaires/secondary data to your email address after payment confirmation.

    8. How can I pay Online with my ATM card?

    1. Visit an ATM

    2. Insert your card

    3. Select Quickteller

    4. Select "Pay bills"

    5. Choose your account type

    6. Select "Others"

    7. Enter 322222 as the payment code

    8. Enter your phone number as "Customer Reference"

    9. Accept the N1.00 amount displayed

    10. Follow prompts to complete the transaction

    9. How will I receive a software?

    A link to download the software will always be on the first page of the material.

    10. I have a fresh topic that is not on your site. How do I go about it?

    We have professional writers in management sciences, computer science and social sciences. If you have a fresh topic, just click this hire a writer link, fill the form, submit the details and one of our writers will contact you shortly.