Professional Documents
Culture Documents
Research and Reporting: Course Name
Research and Reporting: Course Name
Course name
Ann Viitala
Adesh Chymariya
Shu Sheng
Date of the report
4/19/2010
ABSTRACT
CONTENTS
1 INTRODUCTION 3
3 RESULTS 4
5 RECOMMENDATIONS 8
Degree Programme In Information Technology Report
1 Introduction
Data Protection is quite important for students, especially in universities. Nowadays,
people used to store their assignments, essay and other works to their own computer for
good. Everything can go fine but sometimes it can go the other way around especially
when PC starts to crash. For some reasons, one can lost everything that was stored in just
a snap of a finger. That is why protecting data is required to prevent this situation to
happen again. This survey is made to investigate how students of COU protect their data
and how safe their data are. The investigation is conducted with the aid of the IT students
of COU who are more familiar with computers and have better computer skills than the
other groups of students. The target is made by focusing on two main things: (1) their
experience about data security and (2) what kind of software they are using to prevent
data from risks. It is believed that this survey serves the twins objectives which are to
check the current status of information security in the university and also to give us an
opportunity to have a better way to protect data.
The group mainly relied on quantitative approach in conducting the survey. A total of 15
questionnaires were given to IT students of COU belonging to BITS07K, BITS08K, and
BITS09K group respectively. In each question, choices were provided for the students to
tick which would then correspond to their chosen answer(s). In some questions, students
need to justify their choice.
[3]
Degree Programme In Information Technology Report
After the questionnaires were collected from the students/respondents, the data gathered
were tallied and analyzed.
3 Results
According to our group’s opinion, first of all, the survey has to analyze how safe they are
in using computer.
Other
School
1
Workplace
Public
Home
0 2 4 6 8 10 12
The graph above shows the places the students go to access their data or access the
network. It seems that home access is the most common and at the university which are
quite trusted place for this. Despite of that, there is still a chance to encounter data
problem for students, question “Have you ever encountered data problem?” were asked
then the results show below:
[4]
Degree Programme In Information Technology Report
No
Yes
0 1 2 3 4 5 6 7 8
It’s look like students still have some problem with their information and the reason
answered follow this question is quite similar with problems come from PC hardware (PC
or Hard disk crashed) or from operating system problem. We have recorded one person
that lost his/her data from school network which is quite rare.
The number one cause why students lose their information from PC is due to viruses from
internet. It happens when they are browsing some sites which consists some kind of virus
that can crash whole OS with their information without any defending system or firewall.
Figure below show the software the students usually use in defending their system:
NOD32
Window security
F-Secure
Avasti
Bitdefender
AVG
ESET
Kaspersky
0 1 2 3 4
[5]
Degree Programme In Information Technology Report
Those software listed about is quite effective for secure system from virus but about
10/12 (83%) of respondents said that they using the free version which does not provide
full function for software.
The next table shows how efficient they use their anti-virus software to protect PC when
they were asked “How often you perform a full- system virus scan?”
Never
0 1 2 3 4 5 6
It seems that most of the students just scan their system whenever they have some
problems with the OS or they remember (42%). It means that when they scan the system,
the viruses already exist in the system. Result also show about 50% have system scan in
weekly or monthly.
On the other hand, the information is lost due to some technical problems (PC crashed or
accidents). One way to prevent that situation is to back-up data then save it to another
place. Our group also asks the question about how often they back-up their data and here
is the result:
[6]
Degree Programme In Information Technology Report
Never
Everyday
0 1 2 3 4 5 6 7
According to this graph, IT students backup their data at least once a month, about 50%
respondents have back-up their information once a month and 100% respondents got data
backup.
3.3 Browser
Nowadays, web surfing is becoming a familiar activity to everyone and a lot of browser
providers with different abilities for users to choose. This survey also found out what kind
of browsers IT students usually use:
Google Chorme
Maxthon
Opera
Firefox
Internet Explorer
0 2 4 6 8 10
[7]
Degree Programme In Information Technology Report
The result shows that most of IT students use Firefox for browsing (75%) and the reasons
they gave were the following: fast and safe, have a lot add-on. This shows that they have
some knowledge about their browser.
5 Recommendations
According to this survey results, it shows that some of students are not really aware with
data lost problem. If students want to prevent the risk from information security, they
should have a better strategy or plan to do that. We suggest that they should have software
anti-virus from trusted provider like: Microsoft, F-Secure, Kaspersky or Bitdefender. A
strong password should always be implemented. In creating a password, it should be
composed of at least eight characters. It is highly recommended that students perform
virus scan at least twice or once a month. Furthermore, students should back up their
computer data at least once a month.
[8]
Degree Programme In Information Technology Report
6 References
1. American Data Recovery. 2003. Available:
http://www.adrdatarecovery.com/content/adr_loss_stat.html. Accessed 2 May 2010.
2. Doyle, Cynthia. 2002. Business Continuity in 2002: It’s Not Business as Usual. IDC.
3. Kandra, A., Brandt, A. 2003. Great American Privacy. PC World. Available:
http://www.pcworld.com/article/112468-3/great_american_privacy_makeover.html.
Accessed 2 May 2010.
[9]