Sample Essay on:
Preventing the Abuse of Information Technology

Here is the synopsis of our sample research paper on Preventing the Abuse of Information Technology. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

14 pages. Information technology is a wonderful resource for today's world but along with it comes the abuse that is becoming a major concern. Individuals use expired passwords, viruses, phone lines and router ports to gain access to organization's systems. This paper will detail some of the preventative measures that can be used to make organization systems more secure against the use of hackers and the abuse of information technology. Bibliography lists 8 sources.

Page Count:

14 pages (~225 words per page)

File: D0_JGAitabu.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

ports to gain access to organizations systems. This paper will detail some of the preventative measures that can be used to make organization systems more secure against the use of hackers and the abuse of information technology. INTERNET ABUSE Today it is common knowledge that hackers are easily able to use expired passwords, viruses phone lines and router ports to gain access to private information. We might think our computers are secure because, after all, they are in our home or office and only we might have access to them - but anything that goes over phone lines, through cable, or wireless systems is available for a hacker to steal. Many people dont realize the ease with which many technology buffs, or hackers, are able to tap into our private conversations and Internet information. Their ability to do this gives them admittance to everything we do over the Internet: access to our credit cards, personal information, bank accounts and anything else we utilize online can become a treasure trove of illegal activity for the hacker. As with most other entities that offer distinct advantages, they are typically balanced by at least some level of disadvantage. In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual with the opportunity to protect his own privacy is one manner in which people are addressing the issue of computers and privacy. Indeed, there is no such thing as privacy on a computer. Internet users are given the option of accepting or refusing cookies (instruments of collection that automatically transfer private information to the web site) by programming their computers to prompt before continuing. As well, industry boycotts are being conducted against those ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now