Marie Antonette Acha | Asia Pacific College (original) (raw)

Marie Antonette Acha

Android Masters 2015 - Top 5

less

Uploads

Papers by Marie Antonette Acha

Research paper thumbnail of Digital Warzone: An Analysis on Behavior Patterns of Trojan Attacks

Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse i... more Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is typically separated into two parts – a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection is through email attachments. In order to distribute the virus to unsuspecting users, the developer of the virus usually uses various spamming techniques. Malware developers use chat software as another method to spread their Trojan horse viruses such as Yahoo Messenger and Skype. This study aims to analyze and detect the behavior of Trojan attacks, provide ways on how to prevent, detect, and recover from Trojan attacks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Two Factor Authentication for Cloud Storage

— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs t... more — The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in keeping their data online, it poses a lot of security threats and the challenges of protecting their data from being hacked. Recent successful attacks on cloud storage provider has implemented many security controls as a security measure, such as two (2)-factor authentication. The study aims to determine the effectiveness of the said authentication method based on the algorithm used, discuss its potential benefits and weaknesses, and provide other security measures.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Digital Warzone: An Analysis on Behavior Patterns of Trojan Attacks

Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse i... more Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is typically separated into two parts – a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection is through email attachments. In order to distribute the virus to unsuspecting users, the developer of the virus usually uses various spamming techniques. Malware developers use chat software as another method to spread their Trojan horse viruses such as Yahoo Messenger and Skype. This study aims to analyze and detect the behavior of Trojan attacks, provide ways on how to prevent, detect, and recover from Trojan attacks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Two Factor Authentication for Cloud Storage

— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs t... more — The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in keeping their data online, it poses a lot of security threats and the challenges of protecting their data from being hacked. Recent successful attacks on cloud storage provider has implemented many security controls as a security measure, such as two (2)-factor authentication. The study aims to determine the effectiveness of the said authentication method based on the algorithm used, discuss its potential benefits and weaknesses, and provide other security measures.

Bookmarks Related papers MentionsView impact

Log In