Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Information Search and Analysis Skill

(ISAS)

Anti Virus

Arranged by:

 Hafizh Zaldy Alviansyah (2020010049)


 Muhartsal Raihan (2020010082)

Faculty :

Indah Ayu

Continuing Education Program Center for Computing and

Information Technology

Faculty of Engineering, University of Indonesia

2021
PREFACE

First of all, thanks to Allah for all His grace so that this paper can be
arranged to completion. Not forgetting we also say a lot of gratitude for the help
of those who have contributed by contributing both material and mind. They are:

1. Our parents who always support us through spirit or even material.


2. Muhammad Suryanegara as director of CEP-CCIT Faculty of
Engineering, University of Indonesia.
3. Indah Ayu, as our faculty who always lead and, give some advice until the
project has finished.
4. Other parties that help us in doing the research and finding sources of
information and references, such as bloggers, websites, and journal/book
authors.

We hope this paper can increase knowledge and experience for the readers,
for the future can improve the form and add the contents of the paper for the
better.

Due to our limited knowledge and experience, we believe there are still
many shortcomings in this paper, therefore we are looking to forward to
constructive suggestions and criticism from readers for the perfection of this
paper.

Depok, 28 March 2022

Author

i
TABLE OF CONTENT

PREFACE.................................................................................................................i

TABLE OF CONTENT...........................................................................................ii

CHAPTER I INTRODUCTION..............................................................................1

I.1 Background...............................................................................................1

I.2 Writing Objective......................................................................................1

I.3 Problem Domain........................................................................................1

I.4 Writing Methodology................................................................................1

I.5 Writing Framework...................................................................................2

CHAPTER II BASIC THEORY..........................................................................3

II.1 Security System.........................................................................................3

II.2 Types of Security System..........................................................................3

II.3 Security Function......................................................................................3

II.4 Virus..........................................................................................................3

CHAPTER III PROBLEM ANALYSIS..............................................................4

III.1 Anti Virus..................................................................................................4

III.2 Kind of Virus.............................................................................................4

III.3 How Anti Virus Works..............................................................................4

III.4 Scanning Process On Antivirus.................................................................4

CHAPTER IV CONCLUSSION..........................................................................5

IV.1 Conclussion...............................................................................................5

ii
CHAPTER I
INTRODUCTION

I.1 Background

I.2 Writing Objective


The purpose of writing this Paper is to answer the following questions:

1.

I.3 Problem Domain


The things that will be discussed in this ISAS:

1.

I.4 Writing Methodology


Writing methodology used is to search for sources of information and
references from the internet, ask the relatives and read the articles in some
resources.

1
I.5 Writing Framework
Analysis of this ISAS is written with this systematics:

 CHAPTER I : INTRODUCTION
In this section, describe the background, problem analysis, writing
objectives, writing methodology, and systematics of writing.

 CHAPTER II : BASIC THEORY


In this chapter contains theories such as definition, history, basic concepts
and related information interms of analysis, especially on problem
analysis.
 CHAPTER III : PROBLEM ANALYSIS

This chapter deals with problem analysis such as the definition of shell
sort, how shell sort works and the advantages also disadvantages.

 CHAPTER IV : CONCLUSION

In this chapter contains the conclusions of the results of writing.

 BIBLIOGRAPHY
In this section will contains the references that we use.

2
CHAPTER II
BASIC THEORY

II.1 Security System


II.2 Types of Security System
II.3 Security Function
II.4 Virus

3
CHAPTER III
PROBLEM ANALYSIS

III.1 Anti Virus


III.2 Kind of Virus
III.3 How Anti Virus Works
III.4 Scanning Process On Antivirus

4
CHAPTER IV
CONCLUSSION

IV.1 Conclussion

You might also like