This bachelor thesis gives relevant issues about computers today, especially on the use of multimedia systems such as audio and video chat, along with related laws and regulations by government and some past events concerning computer security. Then some basics about computer security, including network basics, and the development of a prototype are described. The prototype development includes web-cam capturing on a victim’s system and the transmission of its images through a network. This prototype is the most important part of the thesis and will cover the investigation with and without oversight by anti-virus
and firewall software. For this purpose, several popular established firewall and anti virus software vendors are analyzed and tested.
Inhaltsverzeichnis (Table of Contents)
- 1 Introduction
- 1.1 Computer relevance today
- 1.2 Audio and Video impact
- 1.3 Laws and regulations
- 1.4 Related work and motivation
- 2 Basics
- 2.1 OSI reference model
- 2.2 Correlation of malware
- 2.2.1 Trojan
- 2.2.2 Adware
- 2.2.3 Virus.
- 2.2.4 Spyware
- 2.2.5 Worm
- 2.2.6 Other
- 2.3 Penetration test
- 2.4 Operating System
- 2.5 Antivirus software.
- 2.6 Firewall
- 2.6.1 Firewall types
- 2.6.2 Network Firewall
- 2.6.3 Personal Firewall
- 3 Demonstrator / prototype
- 3.1 Basics
- 3.2 Operating systems and work environment.
- 3.3 DirectShow
- 3.3.1 Filter.
- 3.3.2 Filter graph
- 3.3.3 Control, create and manage filter graph .
- 3.3.4 Capture Graph
- 3.3.5 Filters for prototype
- 3.4 Data transmission .
- 3.4.1 Initialization and socket creation
- 3.4.2 Send data
- 3.4.3 Close connection
- 3.4.4 Further capabilities
- 3.5 Firewall
- 3.5.1 Windows XP firewall
- 3.5.2 Freeware firewalls
- 3.5.3 Other possibilities.
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This bachelor thesis explores the relevant issues surrounding computer security in the context of multimedia systems, particularly audio and video chat. It aims to investigate the development and analysis of spyware, considering legal frameworks and real-world scenarios. The thesis also delves into the technical aspects of computer security, including network fundamentals and the creation of a prototype.- The use of multimedia systems, especially audio and video chat, in contemporary computing.
- Legal regulations and past incidents concerning computer security.
- The development and analysis of a spyware prototype, examining its functionality and effectiveness.
- The role of antivirus and firewall software in mitigating spyware threats.
- The implications of spyware for user privacy and security.
Zusammenfassung der Kapitel (Chapter Summaries)
- Chapter 1: Introduction - This chapter provides an overview of the relevance of computer security in today's world, focusing on the impact of multimedia systems like audio and video chat. It also discusses relevant laws and regulations and outlines the motivation and related work behind this thesis.
- Chapter 2: Basics - This chapter covers fundamental concepts related to computer security, including the OSI reference model, a classification of malware, and the concept of penetration testing. It also explores operating systems, antivirus software, and firewalls, including their types and functionalities.
- Chapter 3: Demonstrator / prototype - This chapter delves into the development and implementation of a spyware prototype. It explains the basics of the prototype, its operating environment, and the use of DirectShow for capturing webcam images. The chapter also details data transmission methods, including socket creation, data sending, and connection closure. Finally, it examines the effectiveness of various firewalls in detecting and preventing the prototype's activities.
Schlüsselwörter (Keywords)
This bachelor thesis focuses on the development and analysis of spyware in the context of multimedia systems and computer security. Key terms include: spyware, multimedia systems, audio and video chat, computer security, network basics, prototype development, webcam capturing, data transmission, antivirus software, firewall, legal regulations, penetration testing.- Quote paper
- Matthias Wellmeyer (Author), 2011, Spyware development and analysis, Munich, GRIN Verlag, https://www.grin.com/document/170139
-
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X.