Sample Essay on:
The Future Of Computer Crime

Here is the synopsis of our sample research paper on The Future Of Computer Crime. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

3 pages in length. If only the inevitable next stage of computer crime were the heightened progression of hacking, it is quite probable that such technical glitches will continue to force the need for better technical patches. However, the future of computer crime is much more ominous than merely breaking into an otherwise secure network, inasmuch as the notion of psychological warfare has already made its presence known in the virtual atmosphere. Mendell (2000) points out how computer crime is no longer rooted in "the technical shortcomings of inadequate passwords, poor server security, and faulty firewalls," but instead in the psychological vulnerabilities whereby trust is earned with lies, companies are extorted with the threat of circulating consumers' financial data and hoaxes taken for truth spread like wildfire until they have taken on a life of their own. Bibliography lists 4 sources.

Page Count:

3 pages (~225 words per page)

File: LM1_TLCcompcrmfut.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

However, the future of computer crime is much more ominous than merely breaking into an otherwise secure network, inasmuch as the notion of psychological warfare has already made its presence known in the virtual atmosphere. Mendell (2000) points out how computer crime is no longer rooted in "the technical shortcomings of inadequate passwords, poor server security, and faulty firewalls," but instead in the psychological vulnerabilities whereby trust is earned with lies, companies are extorted with the threat of circulating consumers financial data and hoaxes taken for truth spread like wildfire until they have taken on a life of their own. This is not to say, however, that tried and true computer crimes will begin to wane but rather they will be overtaken by the psychological warfare already waging across the virtual globe. Mobile code attack is one of the hacking crimes with the most staying power, inasmuch as it presents a most difficult challenge amid the ever-growing technological advancements of computers; increased frequency is placing incredible pressure upon ways in which to stay ahead with solutions. All forms of Internet commerce can become victim to mobile code attacks, which threaten both privacy and security aspects. So to a great extent, the need for technical patches will still remain pertinent to meeting, if not deflecting, the growth of hacking crimes, but they do nothing when it comes to teaching users to protect themselves, which Mendell (2000) duly notes as being much more important "than knowing Perl, C++, or flaws in the Linux operating system. Deception will flourish because cyberspace is the perfect medium for chicanery. Having evolved into a belief system, the Internet carries a high truth-value in many peoples minds. The unreal has become real" (Mendell, 2000). ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now