Sample Essay on:
THE SUSCEPTIBILITY OF MICROSOFT TO VIRUS INFILTRATION

Here is the synopsis of our sample research paper on THE SUSCEPTIBILITY OF MICROSOFT TO VIRUS INFILTRATION . Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3 page paper discusses the vulnerability problems in Windows by Microsoft. Examples, projections offered. Bibliography lists 2 sources.

Page Count:

3 pages (~225 words per page)

File: D0_MBnetwork.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

of Microsoft computer programming system. Unfortunately, the dark side of that shining star called Microsoft is that it, alone, seems more vulnerable to attack than any other operating system out there. For the most part researchers are baffled, but there are some indications as to what it might be which will eventually lead to some definitive answer as to why Microsoft seems to be the primary target for viruses and worms. Windows seems to be loaded with security flaws and this susceptibility to all sorts of viruses, worms, and Trojan horses have caused users more time and money fighting them and correcting the damage they inflict. Macs, for instance, are not as susceptible, which leads one to wonder what the difference might be. The first difference is obvious right off the bat. The Mac is built on Unix, which most educational and scientific groups utilize. The OS X will not allow certain core files to be altered(Roberts 2003). The option is not even offered. Windows XP users are given the keys to the kingdom, so to speak, and in doing so are having their keys stolen. Another problem that leaves Windows open for vulnerability is that it leaves ports open. These conduits which receive the commands from the various networks are closed so that no outside commands can usurp the original. Windows is kinder and gentler and as a result its open door policy is causing real headaches. Paul Roberts reports for CERT said that "The buffer overrun vulnerability in the Workstation Service, a Windows component, is well suited to exploitation by an Internet worm and would allow malicious hackers to remotely attack and compromise vulnerable systems"(Roberts, 2003). Of course, Microsoft is countering the problem by producing yet another patch for users. But, this has left many owners and ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now