ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Research Proposal Topic on Computer Security

Verified

Added on  2023/04/25

|6
|1187
|243
AI Summary
This research proposal discusses security measures in Windows and Linux, authentication processes, and identity theft in the internet. It also provides references for further reading.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RESEARCH PROPOSAL TOPIC ON COMPUTER SECURITY
Research Proposal Topic on Computer Security
Name of the Student
Name of the University
Author’s note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RESEARCH PROPOSAL TOPIC ON COMPUTER SECURITY
Table of Contents
1. Security Measures in Windows and Linux..................................................................................2
2. Authentication Processes.............................................................................................................2
3. Identity Theft in Internet..............................................................................................................3
References........................................................................................................................................5
Document Page
2RESEARCH PROPOSAL TOPIC ON COMPUTER SECURITY
1. Security Measures in Windows and Linux
Security is a major aspect for the protection of systems in the recent times. Although the
Windows and Linux provide high-level of security within the systems, but still there are some
loopholes within the internal system.
Windows has always remained a stable operation system (OS) in the international
markets. In terms of security aspects, Windows suffers many pitfalls within their underlying
architecture [1]. One such security problem that has been detectable within the OS is the SSL
vulnerability that has remained dormant in each of the OS version. Based on securing the
systems, one kind of input that can put within the system is Windows Firewall. The output for
the Firewall is designed for the protection of OS based on unauthorised access to the computer
systems based on an Internet connection.
The Linux is built for high performance systems. Linux also supports an open-ended
architecture, which the main disadvantage of the system. This allows room for the entry of
viruses. One such problem is the Operation Windigo, which is a certain code that had penetrated
within 25,000 servers. This virus had the capability to sneak into other Linux-based desktops
from all over the world [2]. Based on the impacts of virus, the Linux anti-virus programs should
be installed within the systems. This would ensure stability of output within the systems. The
anti-virus software should be able to protect the internal system software against any kind of
internal attacks. These sophisticated attacks would be averted from the systems.
2. Authentication Processes
In the recent times, the use of digital signature and digital watermarking are commonly
been used for providing a diverse range of solutions. The purpose of authentication is based on
Document Page
3RESEARCH PROPOSAL TOPIC ON COMPUTER SECURITY
identification, security management and keeping a track over digital materials. This form of
technology is mainly used for the purpose of providing protection. These forms of authentication
processes have made a major impact over the issues in relation to computer security.
Some of the major problems based on authentication is based on middle-man attacks [4].
Different security experts have pointed out the fact that a single piece of malware within the
computing systems have been able to imitate an SSL certificate. This malware would then pose
as a form of session token that would need to intercept the text messages that would be able to
send the real token to the other end user.
Based on these kind of problems based on authentication, one of the measures include the
addition of 2-factor authentication [3]. These problems could be overcome with the advantage
gained from OTP based system. These are an additional factor used in the authentication
procedures and web-based services. Improvements within the authentication system would be in
the conduction of online transactions. The phone number of the person should be registered for
gaining the service that would provide the SMS of OTP authentication. The OTP systems would
be valid based on an exact one authentication or authorization request.
(Fig 1: Method of User Authentication and OTP Generation)
(Source: Ziyad and Rehman, 2014)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4RESEARCH PROPOSAL TOPIC ON COMPUTER SECURITY
3. Identity Theft in Internet
The issue based on identity theft on the Internet platform is a major arising problem. The
online scams, frauds, spam and identity theft are in relation to several online purchases and
processes and have thus posed a major risk in the online platform. The surfing of internet while
avoiding the arising threats has been considered to be a serious problem and an issue of
challenge.
Online identity theft is defined as the theft of the personal information of an individual.
These are issues that meant for the committing of fraud within the online systems. The online
theft of the identity of an individual could occur within the email account of an individual or
organisation. It can also occur during the conduction of online purchases [5]. These can also
occur in other situations in which an individual would be in the process of providing some form
of sensitive information to other individual over the internet. This include the passing of credit
card information or the social insurance number.
The theft of identity during the conduction of online shopping is also considered as a
grave concern as it can lead to transactions been hacked and thus the money would be stolen by
hackers who are in the process of the conduction of theft [6]. Thus, the issue of online identity
theft can hamper the security of the individuals and thus this issue should be treated as per proper
security norms. This would thus enhance the quality of internet performance and would ensure
integrity over the platform.
Document Page
5RESEARCH PROPOSAL TOPIC ON COMPUTER SECURITY
References
[1] A. M. Harris and P. K. Patten, “Mobile device security considerations for small-and medium-
sized enterprise business mobility”. Information Management & Computer Security, vol. 22, no.
1, 2014, pp. 97-114.
[2] V. N. Inukollu, S. Arsi, and S. R. Ravuri, “Security issues associated with big data in cloud
computing”. International Journal of Network Security & Its Applications, vol. 6, no. 3, 2014,
p.45.
[3] R. Adhikari, D. Richards, and K. Scott, “Security and privacy issues related to the use of
mobile health apps”. ACIS, 2014.
[4] S. Ziyad and S. Rehman, “Critical review of authentication mechanisms in cloud
computing”. International Journal of Computer Science Issues (IJCSI), vol. 11, no. 3, 2014,
p.145.
[5] N. A. G. Arachchilage and S. Love, “Security awareness of computer users: A phishing threat
avoidance perspective”. Computers in Human Behavior, vol. 38, 2014, pp.304-312.
[6] C. M. Kahn and J. M. Liñares-Zegarra, “Identity theft and consumer payment choice: Does
security really matter?”. Journal of Financial Services Research, vol. 50, no. 1, 2016, pp.121-
159.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]