Research proposal: Computer hacking prevention and solutions
https://ilokabenneth.blogspot.com/2014/01/research-proposal-computer-hacking.html
Author: Iloka Benneth Chiemelie
Published: 1/6/2014
Description
of project
Computer hacking prevention and solutions
Aims and
objectives
This paper is focused on understanding the best way to
prevent computer hacking in both homes and offices. Hacking is a common
practice in modern day computing environment, which involves a hacker
trespassing into another person’s account through software or codes that are
designed to crack unreliable password encryption.
In view of that, this paper will look review some of
the most proven ways to undertake a hacking prevention project, and how such
projects can be adopted in our homes and offices.
The approach to be adopted with be an encryption
design for password, that will have the potential to eliminate any hacking
attempt and offer users more security.
The benefit of this program will be that it will
create a safer internet world, whereby the net citizens will not have to worry
much about the security of their passwords.
Data source
for the project
Primary
data source – the primary
data will be gathered through primary sources in relation to proven practices
from computer scientists, and applications across industries and homes.
Additionally, interview will be conducted with computer scientist to understand
their perception and view about hacking prevention, as well as the right
approach to ensure success in that field.
Secondary
data sources – the secondary
data will be gathered from related computer journals that have discussed the
issue in its in-depth form, and provides guidelines to principles and
approaches of preventing computer hacking.
Methodology
This will be both primary and secondary research.
While the secondary research will be done through desktop research, the primary
research will be based on interview with computer scientist and hackers on how
hacking can be prevented.
Hardware
and software
The necessary hardware a computer system and the
software will be based on tests that will be conducted. However these software
will be readily available at the shopping malls based on personal research, so
there is no worries as to the availability of the necessary software require to
fulfill the requirements of this paper.