Effect of virus on computer systems: A survey of student's perception

2020 ◽  
Vol 26 (1) ◽  
Author(s):  
A.D. Suleiman ◽  
M.I. Mukhtar ◽  
B.S. Galadanci ◽  
S.A. Muaz

Computer viruses are generally malicious, detrimental to data and system integrity as well as a number-one method of computer vandalism. Users of computer systems have different perception of the effect these viruses can cause to a computer system. This paper presents the results of a questionnaire survey carried out in Bayero University Kano to investigate the students’ perception of the effect of computer virus. A total of 120 respondents participated in the study. The data collected was analyzed using descriptive tools such as percentages and charts. Chi-square is then used as inferential tool. The results showed that the frequency of virus attack is statistically significant with exchange of flash drives (p=0.026), browsing in the café (p=0.006) and backing up data (p=0.000). However no significant statistically association was found between frequency of virus attack with type of operating system (p=0.51) and usage of external memory (p=0.726).This research will help in enlightening users especially students on what attract virus to the computer system and how to control the spread and effect of these viruses.Keywords: Virus, Students, SurveyVol. 26, No. 1, June, 2019

2017 ◽  
Vol 2 (5) ◽  
Author(s):  
Bory Daniel Chilán Intriago ◽  
Enrique Javier Macías Arias

Uno de los cambios más sorprendentes del mundo de hoy es la rapidez de las comunicaciones. Modernos sistemas permiten que el flujo de conocimientos sea independiente del lugar físico donde se encuentren. En ese sentido, ya no sorprende la transferencia de información en tiempo real o instantáneo  y debido a que el conocimiento es poder; para adquirirlo, las empresas  se han  unido  en  grandes  redes  internacionales  para transferir datos,  sonidos  e imágenes, y realizar el comercio en forma electrónica, con objeto de ser más eficientes. No obstante, al unirse en forma pública se han vuelto vulnerables, pues cada sistema de computadoras involucrado en la red es un blanco potencial y apetecible para obtener información. El objetivo de esta investigación fue dar a conocer los resultados obtenidos sobre los métodos para defensa contra virus informático. En este trabajo se concluyó que el avance de la tecnología tanto en software como en hardware, ha hecho que los antivirus hayan evolucionado hacia mejores programas que no solo buscan detectar virus informáticos si no bloquearlos y desinfectarlos. Para el desarrollo de esta experiencia  se realizaron encuestas a 69 Ingenieros en Sistemas y Administradores de centros de cómputo de la ciudad de Portoviejo, Ecuador. Se concluyó que La mayoría de usuarios adquieren los programas de antivirus  mediante  descargas  de  la  web,  o  compra  de  programas  piratas,  los  cuales  no protegen totalmente al computador y en vez de volverse una ayuda se convierte en amenazas.  Palabras   claves:   antivirus,   desinfectarlos,   vulnerables,   virus   informáticos,   software, hardware, centros de cómputo  Study of methodologies for defense against computer viruses that can damage computer equipment.   Abstract One of the most striking changes in the world today is the speed of communication. Modern systems allow the flow of knowledge is independent of the physical location where they are. In that sense, no longer surprises transfer or instant real- time and because knowledge is power ; to acquire , companies have joined in large international networks to transfer data, sound and images, and make trade electronically in order to be more efficient. However, joining publicly have become vulnerable, as each computer system involved in the network is a potential target and appealing for information. The objective of this research was to present the results on methods of defense against computer viruses. This paper concluded that the advancement  of technology both  in  software and  hardware,  has  made  the best  antivirus programs have evolved to not only seek to detect viruses if no block and disinfection. For the development of this experience surveys to 69Ingenieros Systems and datacenter managers of Portoviejo, Ecuador ciudadde. It was concluded that most users purchase antivirus programs via web downloads, or buying pirated programs, which do not fully protect the computer and instead of becoming an aid becomes threats. Keywords: antivirus, disinfect, vulnerable, computer virus, software, hardware, computer centers


2018 ◽  
Vol 1 (2) ◽  
pp. 86-93
Author(s):  
I Putu Agus Eka Pratama ◽  
Anak Agung Bagus Arya Wiradarma

The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


2020 ◽  
Author(s):  
S Mukhtar Ayubi Simatupang

AbstrakBrainware adalah istilah yang digunakan untuk manusia yang digunakan untuk manusia yang berhubungan dengan sistem komputer. Manusia merupakan suatu elemen dari sistem komputer yang merancang bagaimana suatu mesin dapat bekerja sesuai dengan hasil yang diinginkan. Tingkatan brainware terdiri atas system analyst, programmer, administrator, dan operator. Bagian bagian brainware terdiri atas operator komputer, teknisi, trainer, konsultan, project manager, programmer, grapic designer, spesialis jaringan, database administrator, dan system analitis. Kata Kunci : Brainware (Perangkat Sumber Daya Manusia)AbstractBrainware is a term used for humans that is used for humans related to computer systems. Humans are an element of a computer system that designs how a machine can work in accordance with the desired results. The brainware level consists of system analysts, programmers, administrators, and operators. The brainware section consists of computer operators, technicians, trainers, consultants, project managers, programmers, grapic designers, network specialists, database administrators, and system analytics.Keywords: Brainware (Human Resources Tool)


Author(s):  
Keith M. Martin

In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.


Author(s):  
Joshua A. Kroll

This chapter addresses the relationship between AI systems and the concept of accountability. To understand accountability in the context of AI systems, one must begin by examining the various ways the term is used and the variety of concepts to which it is meant to refer. Accountability is often associated with transparency, the principle that systems and processes should be accessible to those affected through an understanding of their structure or function. For a computer system, this often means disclosure about the system’s existence, nature, and scope; scrutiny of its underlying data and reasoning approaches; and connection of the operative rules implemented by the system to the governing norms of its context. Transparency is a useful tool in the governance of computer systems, but only insofar as it serves accountability. There are other mechanisms available for building computer systems that support accountability of their creators and operators. Ultimately, accountability requires establishing answerability relationships that serve the interests of those affected by AI systems.


1985 ◽  
Vol 10 (2) ◽  
pp. 79-86 ◽  
Author(s):  
Anne Costigan ◽  
Frances E. Wood ◽  
David Bawden

A comparative evaluation of three implementations of a large databank, the NIOSH Registry of Toxic Effects of Chem ical Substances, has been carried out. The three implementa tions are: a printed index, a text searching computer system, and a computerised chemical databank system, with substruc ture searching facilities. Seven test queries were used, with the aim of drawing conclusions of general relevance to chemical databank searching. The computer systems were shown to have advantages over printed indexes for several of the queries, including those involving an element of browsing. Substructure search facilities were especially advantageous. Aspects of indexing of data present, and the criteria for inclusion of types of data, were also highlighted.


Author(s):  
Norman R. Nielsen ◽  
Brian Ruder ◽  
David H. Brandin

1988 ◽  
Vol 13 (1) ◽  
pp. 25-32 ◽  
Author(s):  
T V Seshadri ◽  
N Kinra

Who, in the organization, buys the computer system? How are various departments involved in the organizational decision process? T V Seshadri and N Kinra analyse the decision processes of 30 organizations that had bought a computer system—mini, mainframe, or macro. Based on a questionnaire study and factor analysis, the authors conclude that the EDP department and Board of Directors are critical in the buying grids of the purchasing organizations. They draw implications of their findings for managers marketing computer systems.


2015 ◽  
Vol 1115 ◽  
pp. 484-487 ◽  
Author(s):  
Muhammad Sami ◽  
Akram M. Zeki

The aim of this study is to create and assemble the system with customizing/building Linux kernel and environments to be compatible and efficient on mini-ITX computer. The objective of the study is to create/customizing lightweight operating system using GNU/Linux to be used on computer to be used on vehicle. The system would also optimize the size and functionalities most probably would be implemented on car computer system.Keywords: mini-ATX, CarPC, Linux, Ubuntu, Qt, QML


Sign in / Sign up

Export Citation Format

Share Document