• Research Paper on:
    Computer Network Security

    Number of Pages: 8

     

    Summary of the research paper:

    8 pages. Computer crimes are becoming more treacherous. It seems computer hackers are keeping up the pace with the security technology and sometimes are even a step or two ahead. This argumentative essay explores whether it is the crime or the security technology that is more high-tech in this increasingly perilous aspect of living our lives through the Internet. Bibliography lists 13 sources.

    Name of Research Paper File: D0_JGAnetse.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    it is the crime or the security technology that is more high-tech in this increasingly perilous aspect of living our lives through the Internet. All forms of Internet commerce can  become victim to mobile code attacks, which threatens both privacy and security aspects. Princeton University professor Ed Felten, co-author of Java Security: Hostile Applets, Holes and Antidotes notes that  leaked or lost data represents a serious attack, which could easily "involve industrial or military espionage, or could compromise personal privacy, corporate security, and trade secrets" (Keyser, PG). According  to GTS consultant Robert Deets, representative of a network security services company, these unwelcome security breaches have been a regular occurrence within industry and government but are kept quiet.  "As with almost all security challenges, experts say, the answer lies in a comprehensive approach that incorporates the three-pronged attack of policy, tools, and administration" (Keyser, PG). Another aspect of  security providers and white-collar crime that people do not often consider is that of email systems. It had not been a problem just a few short years ago when  the Internet was still more or less attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent back in 1994. It  can be argued that with the ever-expanding user-friendly applications over the past decade that figure has grown to represent a seemingly ceaseless procession to the World Wide Web. Attempting  to manage the Internet Protocol (IP) address problem has been quite a difficult maneuver in light of the fact that keeping track of such addressing schemes has not been fully  implemented. "The Internet is under an increasing amount of stress due to its phenomenal growth. There is an effort to replace its underlying IPv4 protocol with an enhanced 

    Back to Research Paper Results