Friday, September 27, 2019

Project Essay Example | Topics and Well Written Essays - 2000 words

Project - Essay Example otential target of these fraudsters who indulge in spreading computer viruses, identity theft, phishing for information and data and several other forms of electronic crimes. This has necessitated the internet users to safeguard the data stored in their computers by installing anti spyware and anti virus software for protecting their valuable information and data. However it is to be noted that technology solutions alone can not act to protect the information and data. Arthur Wong (2004) observes, â€Å"Education and awareness of the individual, whether in the largest multinational corporation, small business or the home user, is critical. Security is more than just installing a piece of software it is using best practices, updating your antivirus, and practicing safe and secure computing† With this background, this project studies the problem of spyware and viruses and presents a report on the issue of spyware and viruses and their impact on the security of the information stored. The paper also discusses the possible future dimensions of the protection through anti spyware and anti virus software. The project is to create awareness among the community of a University about the adverse effects of spyware and viruses on the information and data stored by the administration, staff, faculty and students of the University, as most of the users in the particular University have not considered the security of data on their computers important. In the process of creating this awareness the project describes the various ways in which the spyware and viruses can enter the data bases of the different users and the potential harm it may create to the information and data stored in the respective computers. The project also reports on the ways in which the information and data can be protected from the impact of such spyware and viruses. The major purpose of this project is to identify the relevance of the security of the electronic information to the users. The other

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.