Loading...

Research proposal: Computer hacking prevention and solutions

Author: Iloka Benneth Chiemelie
Published: 1/6/2014

Description of project
Computer hacking prevention and solutions


Aims and objectives
This paper is focused on understanding the best way to prevent computer hacking in both homes and offices. Hacking is a common practice in modern day computing environment, which involves a hacker trespassing into another person’s account through software or codes that are designed to crack unreliable password encryption.

In view of that, this paper will look review some of the most proven ways to undertake a hacking prevention project, and how such projects can be adopted in our homes and offices.

The approach to be adopted with be an encryption design for password, that will have the potential to eliminate any hacking attempt and offer users more security.

The benefit of this program will be that it will create a safer internet world, whereby the net citizens will not have to worry much about the security of their passwords.

Data source for the project
Primary data source – the primary data will be gathered through primary sources in relation to proven practices from computer scientists, and applications across industries and homes. Additionally, interview will be conducted with computer scientist to understand their perception and view about hacking prevention, as well as the right approach to ensure success in that field.

Secondary data sources – the secondary data will be gathered from related computer journals that have discussed the issue in its in-depth form, and provides guidelines to principles and approaches of preventing computer hacking.

Methodology
This will be both primary and secondary research. While the secondary research will be done through desktop research, the primary research will be based on interview with computer scientist and hackers on how hacking can be prevented.

Hardware and software
The necessary hardware a computer system and the software will be based on tests that will be conducted. However these software will be readily available at the shopping malls based on personal research, so there is no worries as to the availability of the necessary software require to fulfill the requirements of this paper.
Technology 2858303212738540055

Post a Comment

Tell us your mind :)

emo-but-icon

Home item

Popular Posts

Random Posts

Click to read Read more View all said: Related posts Default Comments