Question

In: Computer Science

For each project, provide a description of the technology, how it is used and for what...

For each project, provide a description of the technology, how it is used and for what purpose ( benefits), its functions/features, and details (screen shots and descriptions).

- Using a keylogger
-Scanning for Malware using the Microsoft
-Creating a Virtual Machine
-Examining Data Breaches- Visual

The intent is for someone to be able to review your work and have a good understanding of what the technology does, its functions/features, and see it actually in use.

Solutions

Expert Solution

Hello Dear

What you've asked in the question is not a 2 hour job certainly. Since i am time bound so i'm giving you a brief explanation of how these things work.Hope it helps to you.

Like please if you found it helpful.

Keylogger :-

a piece of software that records the signals sent from a keyboard to a computer usually for the purpose of gaining information about the user without the user's knowledge.The keyboard is the primary aim for key loggers to retrieve user input from because it is the most common user interface with a computer. Although both hardware and software key loggers exist but software key loggers are the dominant form. Software keylogger are most inexpensive easily used program. This keyloggers need to be adapted to each target operating system to ensure I/O is handled appropriately.

Additional detail about techniques used in the development, distribution, execution and detection of user- and kernel-mode keyloggers, particularly on Microsoft Windows operating system. A basic concept behind keyloggers and similar malware is their pattern of attack. Most of malware infections follow a fairly standard attack pattern that involves the sequential order of development, distribution and infection, and execution stages. Distribution and execution can both be implemented as a component of the malware and therefore are a contributing factor in its design and development. The keylogging malware to begin executing and can occur in several different ways depending on the implementation and context of the keylogger. However, most realistic keyloggers share two operations:

(a) hooking into user input flow to receive keystrokes

(b) transporting the data to a remote location.

Keylogger applications designed by implementing the Exact String Matching algorithm can record all user activities related to the keyboard, and the results are stored automatically in a dedicated database that can only be accessed by the keylogger owner, the next development of the keylogger application can record the activity on the virtual keyboard or remote activity on the user's computer.

Control of employees and protection against information leaks. Keylogger can be used to monitor correspondence of employees on company computers and control of working time.Control of children and loved ones. Keylogger allows conducting hidden control of computer use by your children. You will protect your children from inappropriate content from the Internet.

Scanning for malware using Microsoft:-

Malware is a short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. they are mainly of 5 types:-

1) Worms 2)Ransomware 3)Scareware 4)Fileless malware 5)Adware and spyware.

Scanning for malware means looking for these bugs inside the computer.

With spam and phishing email being the primary vector by which malware infects computers, the best way to prevent malware is make sure your email systems are locked down tight—and users know how to spot danger.

Although various tools are available in the market to get rid of these malware.Also inbuilt security softwares and programmes has been feed into the system.Windows virus scanning and firewall protection are amongst them. Most of the minor problems can be handled by these inbuilt scanners but they are not always helpful. Infact in some cases antivirus tools also can't help you further.

Creating a virtual Machine:-

In the simplest words Virtual machine is nothing but a computer within a computer.The first question should come in our mind is why do we need virtual machine?

Developers! We see out there. Writing, testing, and deploying projects without fear of ruining the beautiful MacBook. But again, you’re not held back by your device. Need to develop for Android, Windows, or Linux? No problem. Use a virtual machine to achieve your goals safely. That's where virtual machine come into picture.

IT Managers have saved hundreds of thousands of dollars by using virtual machines. This allows for all employees to have exactly what they need without breaking that IT budget by buying multiple computers for multiple people.

There are several good free virtual machine apps out there, which makes setting up a virtual machine something anybody can do. You’ll need to install a Virtual machine software, and have access to installation media for the operating system you want to install.In a particular Virtual machine, the guest OS is stored on a virtual hard drive—a big, multi-gigabyte file stored on your real hard drive. The Virtual machine software presents this file the guest OS as a real hard drive. This means you won’t have to mess around with partitioning or doing anything else complicated with your real hard drive.

The limit to how many Virtual machines you can have are really just limited by the amount of hard drive space.You can also run multiple Virtual machines at the same time, but you’ll find yourself somewhat limited by your system resources. Each Virtual machine eats up some CPU time, RAM, and other resources.

Examining Data Breaches:-

Data breaches are events where information is taken from a system without the system owner's knowledge, and usually without the account holder being aware of it, either. This can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely. The latter is often the method used to target companies.

The type of information taken is largely dependent on the target of the data breach, but in the past, the information has included personal health information; personal identification information, such as name, password, address, and social security number; and financial information, including banking and credit card information.After a series of high-profile data breaches – like Cambridge Analytica and Facebook, or Under Armour and the MyFitnessPal application – business owners turn their gaze back to cybersecurity.

End users are almost never the target of cybercriminals who are out to steal sensitive information in bulk, unless an individual is connected to an industry. However, end users can be affected when their records were part of the information stolen from big companies.To effectively prevent data breaches, companies in the financial industry need to invest in the infrastructure and expertise to protect themselves. And if financial executives truly want to safeguard their organizations, they’ll also need to educate themselves about the constantly-evolving threats their company faces.Once executives understand more about cybersecurity, they’ll want to work to identify potential gaps in their security strategies, and find workable solutions to fill them. These include educating employees about data breaches, instituting new employee policies for increased data safety and taking on the task of updating software and hardware systems, if necessary.


Related Solutions

what the impact of a specific technology on auditing. Provide a description of the technology, an...
what the impact of a specific technology on auditing. Provide a description of the technology, an explanation of its current and potential future impact on auditing, and a suggestion of how auditing and auditors can better adapt to the changes brought about by the technology. Technology Description: Provide a brief description of the technology you chose.  Impact on Auditing: Provide an explanation of the current impact of the technology on auditing and its potential future impact. Support your analysis...
A detailed description of the technology based on the solution .   A description on how it...
A detailed description of the technology based on the solution .   A description on how it will impact climate change.   A thorough discussion as to whether implementation of this technology is feasible. Pros and Cons to it. Answer the question as to whether this technology can significantly reduce or reverse the momentum of climate change by 2050? Solution is below Conservation agriculture uses cover crops, crop rotation, and minimal tilling in the production of annual crops. It protects soil, avoids...
IT Project Management Tools Describe the tools and technology used to support IT project management. What...
IT Project Management Tools Describe the tools and technology used to support IT project management. What are the characteristics of future tools?
Session 5.1 Quick Check Describe push technology and pull technology, and provide examples of each. What...
Session 5.1 Quick Check Describe push technology and pull technology, and provide examples of each. What are three examples of Web 2.0 applications? A series of related messages in a newsgroup or email is called a(n) ______________. Most social websites have built-in ______________ that display content from different feeds. What is a podcatcher and what does it do? What is a mashup? What is a common income source for developers who create mashups?
1/. Provide a detail description of what is doubtful debt and how to identify it, and...
1/. Provide a detail description of what is doubtful debt and how to identify it, and detail descriptions as to what are the procedure to deal with it when it is identified including resolving with the customer and entries to the journals and ledger and accounts. (100 words) 2/. Provide a detail description of what is bad debts and how to identify it, and detail descriptions as to what are the procedure to deal with it when it is identified...
Financial Analysis Project Company: Capri Holdings Provide a description of your selected business - In what...
Financial Analysis Project Company: Capri Holdings Provide a description of your selected business - In what primary industry are the firms? - What do the companies do? - What are their major products and/or services? - Who are their customers? - How does the company differentiate from its competition? Locate your selected company’s mission statement and summarize and comment on its provisions. Identify the various classes of stock, both authorized, issued and outstanding. Does the company repurchase their own stock,...
Use the five competitive forces model to describe how information technology might be used to provide...
Use the five competitive forces model to describe how information technology might be used to provide a winning position for each of these businesses: a. A global advertising agency b. An insurance company
Use the five competitive forces model to describe how information technology might be used to provide...
Use the five competitive forces model to describe how information technology might be used to provide a winning position for each of these businesses: a. A global advertising agency b. An insurance company
Use the five competitive forces model to describe how information technology might be used to provide...
Use the five competitive forces model to describe how information technology might be used to provide a winning position for a local restaurant.
Using the value chain model, describe how information technology might be used to provide a winning...
Using the value chain model, describe how information technology might be used to provide a winning position for each of these businesses: a. A global advertising agency b. A local restaurant c. A mobile applications provider d. An insurance company e. A Web?based audio book service
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT