You have found the "BEST" Term Paper site on the Planet!
PLANETPAPERS.COM!

We GUARANTEE that you’ll find an EXEMPLARY College Level Term Paper, Essay, Book Report or Research Paper in seconds or we will write a BRAND NEW paper for you in just a FEW HOURS!!!

150,000+ Papers

Find more results for this search now!
CLICK the BUTTON to the RIGHT!

Please enter a keyword or topic phrase to perform a search.
Need a Brand New Custom Essay Now?  click here

Computer Viruses

Uploaded by Admin on Jan 22, 1999

Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it's coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country's moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little about them, their motives, and their tools of the trade. Therefore, to be effective in defense, we must understand how these attacks take place from a technical stand-point. To some degree, we must learn to become a computer criminal. Then we will be in a better position to defend against these victimizations that affect us on both the financial and emotional level. In this paper, we will explore these areas of which we know so little, and will also see that computers are really extensions of people. An attack on a computer's vulnerabilities are really an attack on peoples' vulnerabilities. Today, computer systems are under attack from a multitude of sources. These range from malicious code, such as viruses and worms, to human threats, such as hackers and phone "phreaks." These attacks target different characteristics of a system. This leads to the possibility that a particular system is more susceptible to certain kinds of attacks. Malicious code, such as viruses and worms, attack a system...

Sign In Now to Read Entire Essay

Not a Member?   Create Your FREE Account »

Comments / Reviews

read full paper >>

Already a Member?   Login Now >

This paper and THOUSANDS of
other papers are FREE at PlanetPapers.

Uploaded by:   Admin

Date:   01/22/1999

Category:   Technology

Length:   20 pages (4,580 words)

Views:   2155

Report this Paper Save Paper
Professionally written papers on this topic:

Computer Viruses

View more professionally written papers on this topic »