Malware And Security Tools

Read Complete Research Material



[ Malware and Security Tools]

by

Acknowledgement

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

Abstract

In this study we try to explore the concept of computer viruses in a holistic context. The main focus of the research is on the malwares and spywares and their relation with the different operating systems of computers which are used for the domestic and business purposes. The research also analyzes many aspects of the prevention of viruses and tries to gauge their effects on the preventive forces of various anti viruses available today. Finally, the current research study describes the overall effect of viruses and malwares on the businesses and individuals.

Contents

CHAPTER 1: INTRODUCTION……………………………………………………………………………………6

1.1 Problem Statement6

1.2 Research Aims6

1.3 Research Objectives7

1.4 Learning Process7

1.5 Hypothesis/Research Question8

CHAPTER 2: LITERATURE REVIEW…………………………………………………………………………..10

2.1 Malwares10

2.2 Viruses13

2.3 Worms14

2.4 The Difference between Worm and Virus15

2.5 Purpose16

2.6 Types of Malwares17

2.7 Malwares of different Operating Systems26

2.8 Malware Labs29

2.9 Tools for Malware Analysis30

2.10 Tools for different Window Platforms32

2.11 Searching for malware on the web36

2.12 Anti-Viruses and their Assessment37

2.13 Clam AV40

2.14 Compatible Platforms41

Linux, BSD42

Mac OS X42

OpenVMS43

Windows43

CHAPTER 3: METHODOLOGY………………………………………………………………………………….44

3.1 Research Design44

3.2 Research objectives45

3.3 Research instruments45

3.4 Data Analysis46

CHAPTER 4: DISCUSSION AND ANALYSIS…………………………………………………………………..47

CHAPTER 5: CONCLUSION……………………………………………………………………………………...49

REFERENCES………………………………………………………………………………………………………50

Chapter 1: Introduction

The main aim of this chapter is to introduce the malwares, their types and their background along with the objective of this research as well as the explanation of the structure of this report.

The aims of this project is to find the limitations of the computer anti-virus software, and to test whether the computers can be protected with the anti-viruses or not and what can be done to protect the computer. The research conducted is primarily based on a qualitative analysis performed on the subject through the use of online libraries and published reports.

1.1 Problem Statement

The research report is established on the basis of the underlying question as to what extent are the anti viruses able to stop the malwares and other malicious viruses from entering into the computers. This problem statement will be tested on the basis of the availability and the functioning of the anti viruses.

1.2 Research Aims

The research report at hand is based on underlying aim and objectives. The main aim includes the testing of anti viruses for their reliability and validity regarding the functioning of the malware protectors. It will further go deep into the research of the spywares and extensively discuss their applications and testing systems.

1.3 Research Objectives

As the thesis proceeds, the research study will tend to explore the following objectives:

To test the different anti-viruses software and security tools

To discover anti-viruses limitations.

To find out the compatibilities with the different anti-viruses

To find the difference in the Operating Systems tested

To ...
Related Ads
  • Malware
    www.researchomatic.com...

    The prevalence of malicious software tool for ...

  • Malware And Rootkits
    www.researchomatic.com...

    Disable security software to better target th ...

  • Malware
    www.researchomatic.com...

    Malware, Malware Essay writing help source. ... ...

  • Malware, Botnets And Ddos...
    www.researchomatic.com...

    Attacks On Bank Information Security And Pers ...