COMPUTER SCIENCE
EVALUATION OF SCANNING AND INTERCEPTION APPROACHES FOR VIRUS DETECTION IN COMPUTER FILES OF BUSINESS ORGANIZATIONS
With the growing dependence on digital systems, the risk of virus infections poses serious threats to data security and operational efficiency. Using decriptive analysisThe research investigates how proactive virus detection strategies can safeguard sensitive files and enhance productivity.
Chapters
5
Research Type
quantitative
Delivery Time
Instant Download
Full Content
CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
The proliferation of computer viruses globally has posed significant threats to data integrity, operational stability, and productivity in both public and private organizations. These malicious codes are designed to replicate themselves and attach to legitimate files or programs, often resulting in the alteration, theft, or destruction of sensitive information (Alazab et al., 2021). According to Mishra (2020), computer viruses generally consist of three key components: the infection mechanism, the trigger, and the payload or propagation engine. It is this third component—the self-propagating mechanism—that enables viruses to spread rapidly across systems, often through seemingly innocuous activities such as opening infected emails, executing corrupted software, or using compromised external storage devices.
Initially, virus propagation was largely confined to physical media like floppy disks. However, the advent of the internet has introduced new dimensions of risk, enabling rapid virus transmission through email attachments, downloads, peer-to-peer networks, and even social media links (Sophos, n.d.). Furthermore, viruses can spread within organizational networks, from LAN/WAN-based file servers to client machines, thereby disrupting enterprise-wide operations (Chen et al., 2022). The consequences can be particularly severe in business environments where computer systems are integrated with online platforms, databases, and internal information processing systems. A virus attack in such contexts not only compromises data confidentiality but can also incapacitate entire systems, halt operations, and erode consumer trust (Kumar & Singh, 2021).
In response to these threats, businesses have increasingly adopted virus detection and protection mechanisms, with scanning and interception methods being among the most commonly employed strategies. Scanning involves the identification of known threats by matching files against virus signatures, while interception methods focus on monitoring and blocking suspicious activities in real-time (Choudhury et al., 2021). Despite the availability of advanced antivirus software, the dynamic nature of malware evolution calls for continuous evaluation of the effectiveness of these methods, especially in high-stakes environments like business organizations.
1.2 Statement of the Problem
The increasing dependency on computer systems within Nigerian business organizations has rendered them highly vulnerable to malicious software attacks. Despite the installation of antivirus programs, businesses continue to suffer from productivity losses, data breaches, and compromised system integrity due to ineffective or outdated detection strategies. Computer viruses—particularly polymorphic and metamorphic variants—are now capable of evading traditional scanning techniques, making interception methods equally essential (Okonkwo & Daramola, 2023).
In many cases, infected systems within business enterprises lead to delayed operations, corruption of critical employee and customer data, and even system-wide outages. The consequences are particularly dire for organizations relying on real-time digital interfaces, such as online retail platforms or customer management systems. Where computer systems are used to tie employee data and internal processes together, virus infections may render such systems unreliable, undermining organizational efficiency and trust.
Although scanning and interception methods are widely deployed, there remains a gap in empirical studies examining their combined effectiveness in virus detection within Nigerian business settings. This study seeks to fill that gap by evaluating how these techniques impact the detection and mitigation of computer viruses in business organizations.
1.3 Objectives of the Study
The main objective of this study is to examine the effect of scanning and interception methods on computer file virus detection in business organizations. The specific objectives include:
1. To identify the common types of computer virus infections affecting business organizations.
2. To assess the impact of virus infections on business productivity.
3. To determine the effectiveness of scanning and interception methods in detecting computer viruses.
4. To evaluate the extent to which these methods can significantly detect and mitigate virus threats in business environments.
1.4 Research Questions
The study will be guided by the following research questions:
1. What are the prevalent types of computer virus infections in business organizations?
2. How do virus infections affect business productivity?
3. How effective are scanning and interception methods in detecting computer viruses?
4. To what extent can scanning and interception methods significantly detect computer file viruses in business organizations?
1.5 Research Hypotheses
The following hypotheses will be tested in the course of this study:
• H₀₁: Scanning and interception methods are not effective in virus detection.
• H₀₂: The extent to which scanning and interception methods significantly detect computer file viruses in business organizations is low.
1.6 Significance of the Study
The findings of this study will be significant to both private and public sector organizations by highlighting the need for robust, up-to-date antivirus strategies. Business owners will benefit from insights on implementing proactive virus protection measures, such as routine scanning and advanced interception protocols, to secure organizational data and maintain productivity. IT professionals and systems administrators will also find the study useful in choosing effective antivirus tools suited to dynamic business environments.
Furthermore, academic institutions and digital libraries operating in fully computerized environments will be better informed about best practices in virus detection and prevention. The study also holds social relevance, as it informs the general public about virus risks and the necessity of secure computing. Lastly, this research will contribute to the growing body of knowledge on cybersecurity in business environments and serve as a reference for future scholarly investigations.
1.7 Scope of the Study
This study focuses on evaluating the effect of scanning and interception methods on the detection of computer file viruses within business organizations. It covers an assessment of virus types, the impact of infections on productivity, and the effectiveness of specific virus detection techniques. The study is geographically limited to selected private business organizations in Nigeria.
1.8 Limitations of the Study
The study encountered several limitations. Firstly, there is a scarcity of recent literature specifically focusing on the Nigerian context of virus detection in business settings. Secondly, the study’s findings are based on a limited number of private organizations, which may not fully reflect broader sectoral realities, particularly in the public sector. Thirdly, the reliability of data gathered through questionnaires and interviews may be subject to respondent bias. Nonetheless, these limitations do not undermine the validity of the research but suggest avenues for future studies.
1.9 Operational Definition of Terms
Virus: A computer program capable of replicating itself and spreading to other systems or files, often causing damage or data loss.
Scanning: The process of examining files and programs using antivirus software to detect known malware signatures or anomalies.
Interception: A cybersecurity method that involves monitoring and blocking unauthorized or suspicious actions in real-time to prevent system compromise.
Detection: The process of identifying the presence of malicious software or viruses in a computer system.
1.10 ORGANIZATIONS OF THE STUDY
The study is categorized into five chapters. The first chapter presents the background of the study, statement of the problem, objective of the study, research questions and hypothesis, the significance of the study, scope/limitations of the study, and definition of terms. The chapter two covers the review of literature with emphasis on conceptual framework, theoretical framework, and empirical review. Likewise, the chapter three which is the research methodology, specifically covers the research design, population of the study, sample size determination, sample size, abnd selection technique and procedure, research instrument and administration, method of data collection, method of data analysis, validity and reliability of the study, and ethical consideration. The second to last chapter being the chapter four presents the data presentation and analysis, while the last chapter(chapter five) contains the summary, conclusion and recommendation.
Purchase this research topic to download the complete document.
HOT TOPIC
₦4,000.00
One-time purchase
No account required for purchase
What's included:
- Microsoft Word (.docx) document
- 5 well-researched chapters
- 24-hour secure download access
- Instant delivery after payment
Secure payment via Paystack & Flutterwave