Sample Essay on:
Computer Security Issues

Here is the synopsis of our sample research paper on Computer Security Issues . Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 4 page paper discusses computer security in four areas: auditing and monitoring; cryptosecurity; transmission security; and TEMPEST. Bibliography lists 7 sources.

Page Count:

4 pages (~225 words per page)

File: D0_HVcoscis.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

from deliberate attempts to gain unauthorized access, or because of systems failure. This paper considers several various types of computer security issues. Discussion Please note: the prompt for this paper included a list of some 42 separate terms that were to be discussed, which is not possible in a paper this short. It must concentrate only on one or two principle ideas. We begin with auditing and monitoring. Auditing is "a review and analysis of management, operational, and technical controls" (Audit trails). An auditor can use what are called "audit trails" to see what sort of activity has taken place on the system (Audit trails). Audit trails are series of "records of computer events, about an operating system, an application or user activities" (Audit trails). They maintain a "record of system activity both by system and application processes and by user activity of systems and applications" (Audit trails). An auditor using these trails can detect problems with system performance, security violations, and application flaws (Audit trails). Because they monitor system activity constantly, audit trails can detect unauthorized intruders as well as identifying problems in real time (Audit trails). The records of audit trails are called audit logs, of which there are two types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystroke logs keep track of every keystroke (Audit trails). An event log in general specifies "when the event occurred, the user ID associated with the event, the program or command used to initiate the event, and the result" (Audit trails). The log also notes the date and time of the event, which can help determine "if the user was a masquerader or the actual person specified" (Audit trails). Keystroke monitoring is a special type of log: "Examples of ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now