Sample Essay on:
Computer Crime

Here is the synopsis of our sample research paper on Computer Crime. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

12 pages in length. That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. The 1960s, however, is where the timeline of contemporary hacking gets its start, continuing on into the 1970s with John Draper – aka Captain Crunch – hacking the phone company by mimicking the tone that opens a line. By the 1980s, hacking had become much more sophisticated as a vast new entity called 'cyberspace' was introduced to the world. Bibliography lists 15 sources.

Page Count:

12 pages (~225 words per page)

File: LM1_TLCCompCrm.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

but they were not the first to wreak havoc upon vulnerable technology. Prestigious MIT has the distinction of coining the term "hacking," which in the 1960s meant something quite different from the destructive entity it has become today. Back when the word was thought up, it reflected a decidedly more whimsical connotation only to ultimately metamorphose into the harmful infiltration of computer systems. That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. The 1960s, however, is where the timeline of contemporary hacking gets its start, continuing on into the 1970s with John Draper - aka Captain Crunch (Anonymous, 2001) - hacking the phone company by mimicking the tone that opens a line. By the 1980s, hacking had become much more sophisticated as a vast new entity called cyberspace was introduced to the world. Computer hacking became a tremendous focus with one of the first arrests of its kind when the FBI successfully captured a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Laboratory and the Memorial Sloan-Kettering Cancer Center. The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both computer and credit card fraud, while the Computer Fraud and Abuse Act "gives more clout to federal authorities" (Trigaux, 2000, p. PG). Other notable hackers/incidents throughout the 1980s include twenty-five-year-old Kevin Mitnick (monitored MCI email); First National Bank of Chicago is robbed of $70 million via computer; and Indianas "Fry Guy" hacked McDonalds (Trigaux, 2000). Computers have become a significant part of life. ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now