• Research Paper on:
    Cyber Security and Government System Protection

    Number of Pages: 10

     

    Summary of the research paper:

    In ten pages this paper examines the vulnerability of American government's security systems in a consideration of cyberspace issues with recommendations offered. Twelve sources are cited in th bibliography.

    Name of Research Paper File: RT13_SA312gov.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    merger announcement concerning that company (Suhr, 2000). While some might negate the seriousness of the situation, the fact is that both stocks rose soon afterwards raises questions (2000). Hackers  were able to manipulate the market. It is plausible that the hackers could have purchased shares and then released the announcement on the Internet. There are serious ramifications of such  hoaxes. Other relatively recent events, such as the problem where hackers were able to stop electronic commerce of Yahoo, Amazon.com, and eBay as well as other Internet giants by  sending more than 100 times its normal traffic volume, were serious; these criminals were able tie up those popular Web sites for quite awhile (2000). It is easy to  see how important it is for companies to protect their sites as the twenty-first century emerges. Further, another aspect of the problem is that while security breaches are serious, society  has yet to truly embrace it as a real dilemma. Such activity is looked upon as fun. Hackers often impede business simply to see if they can. It is the  challenge that motivates them. Thus, people are more accepting of such sabotage because they look upon the hackers, who are usually young and bright, as being clever. Yet, hackers are  engaging in serious crimes. Ordinary hackers aside--both white hats and black hats--one can say that the most pressing problem today, is the threat of infiltration by foreign government agents.  Yes, there is a slew of data in the United States about the people and there are classified government documents that may be accessed by unauthorized persons. Suppose spies from  China are able to hack into the FBIs database. Not too long ago, it was learned that databases were compromised as a Chinese spy was able to retrieve data from 

    Back to Research Paper Results