• Research Paper on:
    Computer Security and Internal Corporate Hacking

    Number of Pages: 10

     

    Summary of the research paper:

    In ten pages the concept of internal hacking is defined and then the dangers this practice poses to computer security in the corporate sector are analyzed. Eleven sources are cited in the bibliography.

    Name of Research Paper File: TG15_TGhackng.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    have not only become permanent fixtures on personal and professional landscapes, it has become impossible to imagine any facet of our lives without them. The corporate sector is completely  reliant upon intricate networks in order to function on a daily basis. Computer information systems and the Internet are employed to calculate, analyze, and store data, employee records, along  with high-level security matters such as contractual negotiations and company policies; and telecommunications to assist in the gathering and transmission of research and statistical information as well as to perform  banking and credit functions. Because of this dependence, the corporate world has become increasingly vulnerable to anyone and anything that threatens the fragile security computer operations compile and store  on data bases, hard drives and on disks. Access to this information can be obtained by any knowledgeable person with computer hardware and software savvy, and is especially accessible  to an employee who can use his or her insider status to achieve a personal agenda or satisfy a vendetta against management. There are many reasons why employees would want  to break into business computer networks. They might be disgruntled as a result of what they may regard inadequate wages or dissatisfaction with administrative policies. It might be  a reaction against a proposed merger that threatens job security through possible layoffs (Junnarkar, 2002; Ramstack, 2001). It could also be a matter of participating in the all too  common practice of corporate espionage, where competitors offer substantial sums of money to any rival trusted, upper-echelon employee who is willing to infiltrate company computer systems and divulge trade secrets  for a price. Unfortunately, for such security glitches everyone pays a price - other employees who could lose their jobs if sensitive information gets into the wrong hands; the 

    Back to Research Paper Results