Research survey - Coursework Example

Comments (0) Cite this document
Research survey Name Number Course Tutor Date Introduction Cyber crime is any felony that is commited using a computer or any other computer related device for example the internet. It spans from cyber fraud activities to a simple act like downloading a music file from the internet…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Research survey
Read TextPreview

Extract of sample "Research survey"

Download file to see previous pages There are very many cyber crime that can be commited using the computer or with the aid of a computer. The most appropriate way to look at it in detail is identifying them by the types and level of cyber attacks.Cyber attacks are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources. The scope of cyber attack is expands from hardware, software, data that is stored, data in transit, people, documents and other hardware needed like printer cartridges. Scope of the problem The different types of attack that amount to cyber crime and are detriment to cyber security are keylogging and spyware. This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system. An example of this attack is where someone or an individual tries to log on to the system or a website like an email account but the system or the site fails to authenticate the user. To prevent this system administrators should establish a mechanism where if the user complaints of such issue the system should prompt the user by asking some questions relating to the account. The second attack is backdoor or command/control. These are weapons that give remote access that are created to divert the functionality of the system. The other attack is SQL injection. This is a unique attack that targets the web pages of the system application. It cuts down the communication between the database and the system application interface. This attack is common in organization where system implementation is taking place. An example is a situation where an attacker alters the name of the database and hence disconnects it from the user interface. The best measure that can be used to curb this is by limiting the number of the people who has the right to manipulate the database activates and also the punishment that individual that uses a computer to physically hurt another person or tries to commit a felony with an aid of a computer is made severe. There was also a provision of extensive security to media group that gave hand to the police while carrying out the investigation while the vulnerable attacks that were frequent were blacklisted so that more security concern were availed in those areas (Middleton, 2005). Another attack that is very rampant is abuse of system access rights. This kind of attack is mostly executed by the employees in a company in and intention of vengeance or sabotage. Detecting such issue is cumbersome since the intrusion will be taking place internally and hence task tracking may be a challenge. The employees use his or her right to access the system to make alteration and modification of data with the intension of financial gains for example in an employee in the IT department of a water providing company can reduce the consumption figures of some specific accounts then liaise with the holders of those accounts for payment. To combat all frauds that are related to inappropriate billing, the people that are authorized to enter the company’s data concerning the customers must exercise the professional ethics to the fullest. Individual that are given this assignment must have the appropriate integrity basing on the previous records. A body that vets such individual should be established. Such a body should be external and should randomly do the auditing to ensure that the way the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Research survey Coursework Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from
(Research Survey Coursework Example | Topics and Well Written Essays - 3000 Words)
“Research Survey Coursework Example | Topics and Well Written Essays - 3000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Survey Research and Sampling

...? Survey Research and Sampling      Survey Research and Sampling Applicability of surveys as an important research instrument Research denotes a systematized inquiry aimed at finding an answer to an unknown phenomenon (Kothari 2008, p. 3). There are numerous approaches to such inquiries, and surveys form part of these popular methodologies. Surveys are systematic data collection methods applied in gathering, analyzing and interpreting views expressed by a systematically selected group of individuals sampled from a targeted population (Sarah 2012a). This method of research...
4 Pages(1000 words)Assignment

Research survey

...: face-to-face interviews, telephone interviews, and computer aided/virtual interview. Face -to -face interviews have a distinct advantage of enabling the researcher to establish rapport with potential participants and therefor gain their support. An advantage of this form of data collection yields the highest response rates in social surveys. In addition, they allow the researcher to seek clarifications to unclear answers and when appropriate, seek follow-up information. This consequently results into more reliable answers as compared to other data collection methods. Face-to-face also allow an interviewer to explain or help clarify questions, increasing the likelihood of reliable...
8 Pages(2000 words)Essay

Methods & Survey Research Designs

...? Advanced Qualitative Research Methods & Survey Research Designs Affiliation with more information about affiliation, research grants, conflict of interest and how to contact Advanced Qualitative Research Methods & Survey Research Designs Short Answer Identification: Triangulation: Triangulation is a great technique that facilitates justification of data through cross authentication from two or more sources. In particular, it signifies the appliance and amalgamation of several study methodologies for the learning of the same phenomenon. Positive Relationships: Positive relationship is a relationship that signifies a...
8 Pages(2000 words)Coursework

Soc Research Survey Part B Survey Exercise Part B Introduction: Most of the college in the United s not only needto handle their heavy workload from school, also they need to spend their time holding a job. School expenses, social interaction opportunity, and free time are the main reasons for the full-time students having both school and job in their busy schedule. How do these students balance between working and studying at the same time? Do students need to sacrifice their academics and devote time for holding a job? What are the strategies that students can balance between study and job? Students may be facing these questions right now or in the future. Therefore, this research investigated how the UCLA students who are...
3 Pages(750 words)Essay

Research Survey Plan

...Research Survey Plan One of the most essential and concrete sections of a research proposal is the method section of the proposal and there are several essential steps in the designing of a quantitative method of research proposal or study. Research survey plan and modes of enquiry which reflect the alternative knowledge claims have important role in a research proposal. Therefore, it is essential to focus on the fundamental elements of a method section in a research proposal for a survey and an experiment. “A survey design provides a quantitative or numeric description of trends, attitudes, or opinions of a population by studying a sample of that population. From sample results, the researcher generalizes or makes claims about... the...
5 Pages(1250 words)Essay


4 Pages(1000 words)Essay

Amazon Research Survey Background

...Amazon Research Survey Background Amazon was founded in 1994 by Jeff Bezos who is the founder and CEO of In 1994, he became successful in inventing and launching a web based selling platform, which he named Amazon. Jeffrey Becoz is an electrical engineer and computer science graduate from Princeton University. Amazon was one of the first web-based technologies to use software, which had the capacity of monitoring each online customer’s preferences. This made it possible for the company’s products to be recommended to other interested individuals through either personal web page or through the email connection (Ceruzzi, 2003). In only four months of operation, Amazon website became a very...
2 Pages(500 words)Research Paper

Observational Studty Survey Research

...Observational Study Survey Research s of Learning: s Observational Study Survey Research Introduction Smoking has been strongly associated with anxiety and across disorders related to anxiety. As smoking is increasingly linked with the risks of certain disorders of anxiety, anxiety has also been observed to result in varied symptoms and behaviors across different smokers. This paper is out to examine the researches on the correlation between smoking and anxiety in relation to the anxiety disorders, nicotine dependence, factors determining how anxiety impacts smoker’s habits and looks at the already researched empirical literature. Similar...
5 Pages(1250 words)Statistics Project

Design a Research Survey Plan

... Creswell (2003), Fowler (1993) and Salkind define quantitative methods as a process that leads to assembling, analyzing, interpreting, and writing the outcomes of a study. They further observe that there are precise methods that relate to the identification of a population and a sample in experimental and survey research (Creswell 2003, Fowler 1993, and Salkind 2010). These procedures detect the approach of the inquiry, demonstration of results, data analysis and collection, interpreting the data and recording it in a manner consistent with a survey. In this approach, Creswell (2003) denotes that postpositivist claims in developing knowledge. This involves effect thinking, using measurement and observation procedures to analyze... an...
4 Pages(1000 words)Research Proposal

Preliminary research (survey report: global warming)

... participants in the study. Apart from that the researcher has to formulate the right questions that are tackling the issues involved in the study (Ashton, 2012). Reference Ashton, P. (2012). Research Methods for Community Change: A Project-Based Approach. Gateways: International Journal of Community Research & Engagement, 5, 201–202.... warming report al affiliation Global warming report From an interview, it is evident that the people interviewed areaware of the presence of global warming happening. Eighty percent of the people are aware of the presence of global warming, and the remaining twenty percent have no idea. On the knowledge of the causative agents for global warming, sixty...
1 Pages(250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Research survey for FREE!

Contact Us