• Research Paper on:
    IT Abuse Prevention

    Number of Pages: 14

     

    Summary of the research paper:

    In fourteen pages this paper discusses organizational prevention of information technology misuse such as information abuse and problems caused by hackers. Eight sources are cited in the bibliography.

    Name of Research Paper File: D0_JGAitabu.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    ports to gain access to organizations systems. This paper will detail some of the preventative measures that can be used to make organization systems more secure against the use  of hackers and the abuse of information technology. INTERNET ABUSE Today it is common knowledge that hackers are easily able to use expired passwords, viruses phone lines and  router ports to gain access to private information. We might think our computers are secure because, after all, they are in our home or office and only we might  have access to them - but anything that goes over phone lines, through cable, or wireless systems is available for a hacker to steal. Many people dont realize  the ease with which many technology buffs, or hackers, are able to tap into our private conversations and Internet information. Their ability to do this gives them admittance to  everything we do over the Internet: access to our credit cards, personal information, bank accounts and anything else we utilize online can become a treasure trove of illegal activity for  the hacker. As with most other entities that offer distinct advantages, they are typically balanced by at least some level of disadvantage. In the case of computers and Internet  access, loss of privacy represents one of the biggest concerns. Empowering the individual with the opportunity to protect his own privacy is one manner in which people are addressing  the issue of computers and privacy. Indeed, there is no such thing as privacy on a computer. Internet users are given the option of accepting or refusing cookies  (instruments of collection that automatically transfer private information to the web site) by programming their computers to prompt before continuing. As well, industry boycotts are being conducted against those 

    Back to Research Paper Results