MEMO To: DR.Elif Guler From: Thomas Wilson Date: Subject: Proposal for a manual of the basic of removing and preventing malware and other harmful objects. Problem: With the rise of computers there are more and more unique and sophisticated pieces of malware and virus floating around. Luckily most of the more “lethal” malware (evil software) only comes around to those machines that have already been infected with smaller and less harmful objects. Being able to remove these objects before more major damage can occur is the ideal situation for those who have been infected. Even with so many different programs and forums out there, it is hard to decide the right program or information to get the job done. Having a simple ready to use guide to combat the issues such as malware and viruses would help user: 1. Prevent the installation of malware and viruses on their machines. 2. Successfully remove all malware and viruses from their machines and the machines of others. 3. And the most important, with this knowledge they can potential save these selves, and others large amounts of money that would be used to fix the problems after they had already gone out of control. Purpose: The purpose of this manual will be to provide a quick and easy reference guide to those who wish to further their understanding on how to manage malware and viruses. Which in turn will help lower the incidents experienced by users. Topics to investigate: 1. Common methods that malware and viruses use to get onto the victims machine. 2. Efficient and easy ways to remove and prevent harmful objects. 3. Finding out which software is the best and most cost efficient at removing the harmful items from ones computer. 4. And statistical data on the amount of money lost from malware and data on how many individuals know the basics of virus protection. Audience The primary audience will be those who have little no knowledge on this topic and wish to learn more to improve their protection. The secondary audience will be those who have prior knowledge of this topic and wish to refine their skills or check their knowledge to the information in this manual. The gatekeeper will by my teacher Dr. Guler who will be keeping a copy of this manual for grading and possible future reference for other classes. Methods As well as using my own knowledge on the topic, some of the other methods will include: 1. Looking over the advice and statistical data of the larger anti-virus and malware companies. 2. Obtaining the information on how malware comes about in one’s system and signs that it is present. 3. Learning about some of the most common malware as well as some of the most dangerous. 4. Finding out the average amount of money that is spent to combat the effects of malware and its counterparts. Using all the data collected, a convenient and informational manual that will provide its readers with the knowledge on how to handle the increasing amount of dangerous material that is trying to infect their computer. As well as providing the chance for the reader to decrease the amount of money that they might have to spend to fix an issue caused by a virus or malware. Qualifications and Feasibility I am confident in my ability to create this manual because since about 5 years ago I have be learning and improving my ability to fight against malware and its effects. In this time I have watched and listened to tech support and classes. As well as being a part of the computer science major and the cyber security minor I have worked for Dominion power on their risk management team. The risk management team was the group that dealt with the daily attacks and potential breaches that happened every day. I am currently a RTA for Longwood University so I am knowledgeable in methods for fixing these issues. Along with my prior knowledge there are plenty of trustworthy resources that can be utilized to add to the informational load of the manual. Most anti-virus/malware companies provide pages that describe the dangers of malware and how to prevent it weather in be by using their product of by informing the reader of to do it themselves. Resources Antivirus sites such as Microsoft and Kaspersky. Fellow RTAs and Computer Scientist. Online forums and question boards.