• Research Paper on:
    Computer Crime: Can we Really be Effective in Fighting it?

    Number of Pages: 7

     

    Summary of the research paper:

    7 pages. Computer crimes are becoming more treacherous. It seems computer hackers are keeping up the pace with the security technology and sometimes are even a step or two ahead. This argumentative essay explores whether it is the crime or the security technology that is more high-tech in this increasingly perilous aspect of living our lives through the Internet. Bibliography lists 10 sources.

    Name of Research Paper File: D0_JGAccrme.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    ahead. This argumentative essay explores whether it is the crime or the security technology that is more high-tech in this increasingly perilous aspect of living our lives through the  Internet. A LOOK AT COMPUTER CRIME All forms of Internet commerce can become victim to mobile code attacks, which threatens both privacy and security aspects. Princeton University professor  Ed Felten, co-author of Java Security: Hostile Applets, Holes and Antidotes notes that leaked or lost data represents a serious attack, which could easily "involve industrial or military espionage, or  could compromise personal privacy, corporate security, and trade secrets" (Keyser, 1998, PG). According to GTS consultant Robert Deets, representative of a network security services company, these unwelcome security breaches  have been a regular occurrence within industry and government but are kept quiet. "As with almost all security challenges, experts say, the answer lies in a comprehensive approach that  incorporates the three-pronged attack of policy, tools, and administration" (Keyser, 1998, PG). Another aspect of security providers and white-collar crime that people do not often consider is that of email  systems. It had not been a problem just a few short years ago when the Internet was still more or less attracting the novice-to-intermediate computer user; however, the growth  rate for the Internet was no less than fifteen percent back in 1994. It can be argued that with the ever-expanding user-friendly applications over the past decade that figure  has grown to represent a seemingly ceaseless procession to the World Wide Web. Attempting to manage the Internet Protocol (IP) address problem has been quite a difficult maneuver in  light of the fact that keeping track of such addressing schemes has not been fully implemented. "The Internet is under an increasing amount of stress due to its phenomenal 

    Back to Research Paper Results