Sample Essay on:
Computer Security

Here is the synopsis of our sample research paper on Computer Security. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

8 pages in length. As the first of billions of emails flew through cyberspace nearly thirty years ago, the idea of computer security was not at the forefront of users' minds. In fact, the very notion of any threat inherent to the World Wide Web was so unheard of that even those who stood a great deal to lose from unauthorized entry were basically oblivious to the looming danger that would appear only years later. Today, computer security is the number one priority for anyone who uses the Internet, a reality born of unforeseen infiltration by those who seek to do great harm to the recipient of such an attack. Bibliography lists 8 sources.

Page Count:

8 pages (~225 words per page)

File: LM1_TLCCompSecur.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

threat inherent to the World Wide Web was so unheard of that even those who stood a great deal to lose from unauthorized entry were basically oblivious to the looming danger that would appear only years later. Today, computer security is the number one priority for anyone who uses the Internet, a reality born of unforeseen infiltration by those who seek to do great harm to the recipient of such an attack. "Recent surveys indicate that anywhere from 25% to 50% of American businesses have detected some sort of security breach in their computer networks in the past year....The losses caused by these breaches are more pernicious and far reaching than one might initially think" (Yang et al, 2006, p. 201). II. IN THE BEGINNING... That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. Starting with security breaches on phone lines, the 1980s saw it quickly move to the much more sophisticated entity called cyberspace. Computer hacking became a tremendous focus with one of the first arrests of its kind when the FBI successfully captured a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Laboratory and the Memorial Sloan-Kettering Cancer Center. The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both computer and credit card fraud, while the Computer Fraud and Abuse Act "gives more clout to federal authorities" (Trigaux, 2000) where apprehension and consequence. III. FENDING OFF SECURITY BREACHES System security has become increasingly more important within the past several years, ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now