Write a researched report that contain the following elements: title page, letter of transmittal in proper format for business letters, table of contents, table of tables and figures, informative abstract for the busy executive who cannot read the entire paper, introduction (purpose, sources, authorization), conclusions, recommendations, and finally the body of the paper with clearly numbered headings for each paragraph. The research report should be about 2500 to 3500 words, and contain a Works Cited section in MLA format that has parenthetic citations to refer to the Works Cited page.
A new company in town wants to begin a local-area network to make communication easier among the various parts of the company. However, they are very concerned about protecting their investment by keeping virus
attacks out of their computer
system. They themselves have no idea what viruses
might be out there; they are merely paranoid about all the stories they?ve heard. However, they do think they ought to become more knowledgeable about viruses
. So, they hire you, a well known experts about viruses
, to research types of viruses
and the damage they can do. When you have completed your research, you submit to the company a well researched and well presented business report that draws some clear conclusions and offers some solid recommendations about the way they need to handle the virus
threat. The research report needs to conform to the following outline:
Letter of Transmittal
Table of Contents
Table of Tables and Figure
4. Threats to Local Area Networks (LAN)
4.1. Computer Viruses
18.104.22.168. Encrypted Code
22.214.171.124. Mutating Code
126.96.36.199. Polymorphic Code
4.3. Trojan Horses
4.4. Hackers and Crackers
4.5. Securing Networks Systematically
4.5.1. Customizing Software
4.5.2. Harden and Secure the Network
4.5.6. Improve the System
4.5.7. Repeat the Cycle of Steps
5. Works Cited
The report should contain zero passive sentences.
[ Order Custom Essay ]
[ View Full Essay ]
Brouwer, Mark W. Virus or Hoax?
1997. Virusall.com. June 01, 2004. http://virusall.com/virus.html
Landesman, Mary. Boot Sector Viruses.
2004. Antivirus.com. June 01, 2004. http://antivirus.about.com/cs/tutorials/a/bsvirus.htm
Mehta, Saumil. Virus Basics.
2001. Internet Explorer Supersite. June 01, 2004. http://balasainet.com/iesupersite/support/virus.htm
Schmugar, Craig. I Love You Virus Information.
2000. Get Virus Help. June 01, 2004. http://getvirushelp.com/iloveyou/
Brouwer, Mark. Virus or Hoax?
Virusall.com. June 01, 2004. http://virusall.com/worms.html
Adams, Mark. Hackers or Crackers.
The Magazine of Hal-PC User Group. June 01, 2004. http://www.hal-pc.org/journal/dec99/Column/hackers/hackers.html
Securing Networks Systematically - the SKIP Method.
Cert Coordinator Center. June 01, 2004. http://www.cert.org/archive/pdf/SKIP.pdf