Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010.

Similar documents
2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Free antivirus software download

NUIT Tech Talk: Spring Cleaning Remembering the Technology?

FAQ. Safe Anywhere PC 12. Disclaimer:

Manual Removal Norton Internet Security Won't Open Or

ABF Software Issues Caused by Anti-Virus Programs

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

Firewall Antivirus For Windows Xp Full Version 2013

NUIT Tech Talk: Spring Cleaning Keep Your Computer in Great Shape

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli

How to Stay Safe on Public Wi-Fi Networks

Securing the SMB Cloud Generation

Norton 360 Manual Scanning Not Working Windows 8

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Comparison Of Antivirus Software

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Airtel PC Secure Trouble Shooting Guide

IT Coordinator/Lecturer. Do you encounter computer problems?

Cyber Security Basics. Presented by Darrel Karbginsky

Student manual. FAQ and preparation before exam

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

Spring Cleaning: Keep Your Computer in Great Shape

A weekly Spa Day for your Computer

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

Remove Manually Norton Internet Security 2012 Will Not Start

Start to Finish: Set up a New Account or Use Your Own

Small Office Security 2. Scan PC for viruses and vulnerabilities

How To Remove Personal Antivirus Security Pro Virus

How to use a computer safely Tips and Tricks. Dr. Pierre Darmon

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Free antivirus software download windows 10

3.5 SECURITY. How can you reduce the risk of getting a virus?

How To Remove Virus Without Antivirus In >>>CLICK HERE<<<

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.

NET 311 D INFORMATION SECURITY

Turn On Windows Defender Windows 8.1 This App Has Been Turned Off

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

CleanMyPC User Guide

Firewall Antivirus For Windows Xp Avast 2012 With Key

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

VF-Atak. Virus Flood Attack on Desktop Anti-Virus Programs. Lucijan Caric & Tomo Sombolac 2005, QUBIS d.o.o.

Staying Safe on the Internet. Mark Schulman

SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J A N D O B J 3-2)

How to Configure Anti-Virus to Permit SoftMiner Binaries

How To Remove Personal Antivirus Security Pro Virus Manually

Real Fast PC. Real Fast PC Win 7.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

INTERNET SAFETY IS IMPORTANT

2013 NATIONAL ONLINE SAFETY STUDY

Helpful information for everyone

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight Sandboxie.lwp revised

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

How To Remove Internet Security Pro Virus. Manually >>>CLICK HERE<<<

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!

MRG Effitas Real Time Protection Test Project, First Quarter Q MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)

Ryan KS office thesee

Download antivirus free

Keeping Your Computer Secure Quick Reference Guide

Norton Internet Security 2012 Removal Tool For Windows 7

How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode

How To Remove Personal Antivirus Security Pro Virus Windows 8

COMMON WINDOWS 10 QUESTIONS & ANSWERS

Security Industry Market Share Analysis

Download firefox with virus protection

NetDefend Firewall UTM Services

ANNOYING COMPUTER PROBLEMS

Getting Started with Internet Explorer 10

Windows 10 Challenges Part of a Series on Deciding About Adopting and Using Windows 10

Remove Trend Micro Titanium Internet Security Without Password

Welcome to the world of .

Browsing the World Wide Web with Firefox

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Cyber security sector has its own laws. There is no time to relax, and certainly antivirus developers can t afford this privilege.

Adobe Security Survey

NUIT Tech Talk: Get to Know Your Computer

CODE MAROON TEST SEPT. 30, 2011 SURVEY RESULTS

Course Outline (version 2)

7.16 INFORMATION TECHNOLOGY SECURITY

Manually Windows Update Vista Not Work In

Anti-Virus Comparative Summary Report 2008

Cannot Remove The Mcafee Agent Other Products Are Using It

24/7 Instant Technical Support Designed for Non-Geeks

The State of the American Traveler TM

Clean & Speed Up Windows with AWO

Advanced Computer Skills and Hardware Instructor: Jonathan Barkand ( )

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

Lecture 1 Niyaz M. Salih

OPERATING SYSTEMS AND APPLICATIONS

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Murray Bridge High School Connecting to the BYOD Network Mac OS X Version 3 Amended 2/10/2014

SUMMARIES OF INTERACTIVE MULTIMEDIA

Transcription:

Course name Assignment Authors Research and reporting Survey Nguyen Ngoc Long Ann Viitala Adesh Chymariya Shu Sheng Date of the report 5/2/2010 ABSTRACT

CONTENTS 1 INTRODUCTION 3 2 THEORETICAL FRAMEWORK, METHODOLOGY AND DATA 3 3 RESULTS 4 3.1 ANTI-VIRUS SOFTWARE 5 3.2 DATA BACK-UP 6 3.3 BROWSER 7 4 DISCUSSIONS AND CONCLUSION 8 5 RECOMMENDATIONS 8 6 REFERENCES 9

1 Introduction Data Protection is quite important for students, especially in universities. Nowadays, most students use computers in storing their assignments, essay and other works for good. Everything can go fine but sometimes it can go the other way around especially when PC starts to crash. For some reasons, one can lost everything that was stored in just a snap of a finger. That is why protecting data is required to prevent this situation to happen again. This survey is made to investigate how students of COU protect their data and how safe their data are. The investigation is conducted with the aid of the IT students of COU who are more familiar with computers and have better computer skills than the other groups of students. The target is made by focusing on two main things: (1) their experience about data security and (2) what kind of software they are using to prevent data from risks. It is believed that this survey serves the twins objectives which are to check the current status of information security in the university and also to give us an opportunity to have a better way to protect data. 2 Theoretical Framework, Methodology and Data A study revealed that 60% of corporate data were unprotected in PC desktops and laptops. One of the reasons for data loss was attributed to viruses. Each month, the PC s were infected with viruses at a rate of 10%. (Doyle 2002.) Even though they were using antivirus applications, they rarely updated their files and performed virus scan (Kandra 2003). Hardware or system malfunction is still the number one cause of data loss (American Data Recovery 2003). The corporate world is the biggest users of databases and other forms of data storage applications because their data are very important and crucial to their business operations. The statistical data and the results of the survey conducted on how the corporate world protect and secure their data will be used as the theoretical source of our research. The group mainly relied on quantitative approach in conducting the survey. A total of 15 questionnaires were given to IT students of COU belonging to BITS07K, BITS08K, and BITS09K group respectively. In each question, choices were provided for the students to tick which would then correspond to their chosen answer(s). In some questions, students need to justify their choice. [3]

After the questionnaires were collected from the students/respondents, the data gathered were tallied and analyzed. 3 Results According to our group s opinion, first of all, the survey has to analyze how safe they are in using computer. 1 Other School Workplace Public Home 0 2 4 6 8 10 12 GRAPH 1. Places where students usually have access to computers The graph above shows the places the students go to access their data or access the network. It seems that home access is the most common and at the university which are quite trusted places for this. Despite of that, there is still a chance to encounter data problem for students, question Have you ever encountered data problem? was asked then the results show below: [4]

No Yes 0 1 2 3 4 5 6 7 8 GRAPH 2. Students who encounter data loss problems It looks like students still have some problems with their information and the most common reason was due to problems with PC hardware (PC or Hard disk crashed) or from operating system. We have recorded one person that lost his/her data from school network which is quite rare. 3.1 Anti-virus software One of the reasons why students lose their information from PC is due to viruses from internet. It happens when they are browsing some sites that carry some kind of virus that can crash whole OS with their information without any defending system or firewall. Figure below shows the software the students usually use in defending their system: NOD32 Window security F-Secure Avasti Bitdefender AVG ESET Kaspersky 0 1 2 3 4 GRAPH 3. The type of anti-virus software students are using [5]

Those software listed above are quite effective for securing a system from virus but about 10/12 (83%) of respondents said that they using the free version which does not provide full function for software. The next table shows how efficient they use their anti-virus software to protect PC when they were asked How often you perform a full- system virus scan? Never When I remember or PC in danger At least once a year At least once a month At least once a week 0 1 2 3 4 5 6 GRAPH 4. The frequency of performing anti-virus scan It seems that most of the students just scan their system whenever they have some problems with the OS or they remember (42%). It means that when they scan the system, the viruses already exist in the system. Result also show about 50% have system scan in weekly or monthly. 3.2 Data Back-up On the other hand, the information is lost due to some technical problems (PC crashed or accidents). One way to prevent this situation is to back-up data, then save it to another place. Our group also asks the question about how often they back-up their data and here is the result: [6]

Never once in every 6 months At least once a year At least once a month At least once a week Everyday 0 1 2 3 4 5 6 7 GRAPH 5. The frequency of performing file back-up According to this graph, IT students backup their data at least once a month, about 50% respondents have back-up their information once a month and 100% respondents got data backup. 3.3 Browser Nowadays, web surfing is becoming a familiar activity to everyone and a lot of browser providers with different abilities for users to choose. This survey also found out what kind of browsers IT students usually use: Google Chorme Maxthon Opera Firefox Internet Explorer 0 2 4 6 8 10 GRAPH 6. The type of web browser students are using [7]

The result shows that most of IT students use Firefox for browsing (75%) and the reasons they gave were the following: fast and safe, have a lot add-on. This shows that they have some knowledge about their browser. 4 Discussions and Conclusions Information technology with its applications has been growing rapidly and become popular for all people including students of COU. Following with this development, information security also become important for those who always work with data. This survey captures how IT students meet their problem in data security and how they protect their information from lost or damage. The survey especially selected its target group is IT students with have skills in IT fields and should be more careful in data protection and the key point of this survey is how good they are in this field. Results of this survey help understand the trend to protect information of student and how they are aware of this risk. The result can become a key to help students of COU have a better plan for protect their personal information. Majority of the respondents of our survey revealed that they have encountered data loss problems and they attributed it to hardware or system malfunction caused by viruses from internet. Although they are using anti-virus applications, it was found out that it did not help that much because most of them are using free version and the functionality provided by those free anti-virus applications are limited. Furthermore, most of them rarely perform virus scan on a regular basis. 5 Recommendations According to this survey results, it shows that some of students are not really aware with data lost problem. If students want to prevent the risk from information security, they should have a better strategy or plan to do that. We suggest that they should have software anti-virus from trusted provider like: Microsoft, F-Secure, Kaspersky or Bitdefender. A strong password should always be implemented. In creating a password, it should be composed of at least eight characters. It is highly recommended that students perform virus scan at least twice or once a month. Furthermore, students should back up their computer data at least once a month. [8]

6 References 1. American Data Recovery. 2003. Available: http://www.adrdatarecovery.com/content/adr_loss_stat.html. Accessed 2 May 2010. 2. Doyle, Cynthia. 2002. Business Continuity in 2002: It s Not Business as Usual. IDC. 3. Kandra, A., Brandt, A. 2003. Great American Privacy. PC World. Available: http://www.pcworld.com/article/112468-3/great_american_privacy_makeover.html. Accessed 2 May 2010. [9]