Beruflich Dokumente
Kultur Dokumente
Have you ever experienced a virus in your computer? If you have, then this is the
research study you need to learn. As our generation advances together with our technology, the
human power created different kinds of computers, to satisfy the technological need of a person.
Our technology leveled up to much innovation to the point where Hackers and Trojans creates
malicious software’s to infiltrate and damage our technology without consent. This study
examines the different types of malwares and how do they operate to destroy our computers as a
Virus creators or “virus writers” started in early 80’s until the late 90’s hackers and virus
writers used their profession for criminal use. The internet had become everyone’s nurse for
information. Businesses and banks were already using it for transactions. As practical as online
shopping and banking are, they also started a world of opportunities for economic exploitation of
The term malware includes viruses, worms, Trojan, Horses, rootkits, spyware, key
loggers and more. To get an overview of the difference between all these types of threats and the
Viruses and Worms – they are defined by their action – malicious software designed to
spread without the user’s knowledge. A virus infects software and when the software is used by
the owner of the computer it spreads the virus – so viruses need you to act before they spread.
Computer worms on the other hand, spread without the user’s action.
Trojans and Rootkits- they are grouped together as they both seek to conceal attacks on
computers. Trojan Horses are malicious pieces of software pretending to be benign applications.
Computer users therefore download them thinking that they will get a lot of help from this
software and instead of getting help, they end up getting malware infections. Rootkits are
different. They are a masking technique for malware, but do not contain damaging software.
Rootkit were invented by virus writers to conceal malware, so it would go unnoticed by antivirus
products.
Spyware and Keyloggers – are malware used in malicious attacks like identity theft,
phishing and social engineering – threats designed to rob money from unknown users, businesses
and banks. The latest security reports for the first quarter of 2011 put Trojan infections at the
summit of malware list, with more than 70% all of malicious files detected on computer units
followed by traditional viruses and worms. (The definition of Malware/ What is malware in
This study aims to determine about the computer problem Malware towards the usage of
Computer Academic Purpose in some School and Shops particularly in General Pio Del Pilar.
A. Name (optional)
B. Age
Computer Shops
It will be a large factor for computer shop owners in terms of awareness in the effect of
malware in their computers. This study may help them know about the information gathered
Teachers
This study will inform the teacher about the malware of computers thus, make the
teachers aware if his/her laptop is broken because of the malware so that he/she can easily go to
the repair shop and let them fix the malware in his/her laptop.
Due to this study, the DepEd will be informed to enhance and widened the standard of
the quality of the laptop they use for educational purposes. The officials from DepEd will be
In our generation today where technologies arise, different computers come up.
Computer is an instrument where you can do so many things such as playing, researching,
working and use it for academic purposes, etc. Computer is so helpful in our society today, but
we cannot manage it properly if it has problems. This study will give us awareness about
Furthermore the researchers assume that this study will be successful and will give knowledge to
others and know the possible effects and disadvantages of computer crimes especially to those
who are using computer to prevent other types of problem in software or hardware.
This will give awareness to those who are planning to build computer shops as their business.
The study will focus on Malware, basically how they function, and the different types of it. We
conducted data in different computer shops and asked them “What are the problems you
encounter in this shop or in the computers?” And by that we will know that one of their problems
is Computer Malware which we already explained. And by researching this also and studying
computer malware we can easily know what will happen or what can happen to our computer
because of computer malware. We can install different types of scanners and anti-viruses to
COMPUTER
- An Electronic Device for storing and processing data, typically in binary form, according to
MALWARE
- Malware, or malicious software, is any program or file that is harmful to a computer user.
Malware includes computer viruses, worms, Trojan horses and spyware (Rouse 2008)
SOFTWARE
HARDWARE
- Computer hardware is a collective term used to describe any of the physical components of an
analog or digital computer. The term hardware distinguishes the tangible aspects of a computing
device from software, which consists of written instructions that tell physical components what
to do (Rouse 2006)
GADGETS