Please use this identifier to cite or link to this item:
https://etd.cput.ac.za/handle/20.500.11838/1363
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mullany, Mike | en_US |
dc.contributor.advisor | Rossouw, Steve | en_US |
dc.contributor.advisor | Warden, Stuart | en_US |
dc.contributor.author | Weideman, Melius | en_US |
dc.date.accessioned | 2013-03-04T05:09:48Z | - |
dc.date.accessioned | 2016-02-20T07:08:31Z | - |
dc.date.available | 2013-03-04T05:09:48Z | - |
dc.date.available | 2016-02-20T07:08:31Z | - |
dc.date.issued | 1994 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11838/1363 | - |
dc.description | Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994 | en_US |
dc.description.abstract | Computer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Cape Technikon | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/za/ | - |
dc.subject | Computer viruses | en_US |
dc.subject | Microcomputers | en_US |
dc.title | A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Information Technology - Master's Degree |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
186044569_Weideman_m_MTech_IT_1994 | 4.2 MB | Adobe PDF | View/Open |
Page view(s)
1,629
Last Week
1
1
Last month
6
6
checked on Nov 27, 2024
Download(s)
1,211
checked on Nov 27, 2024
Google ScholarTM
Check
This item is licensed under a Creative Commons License