Here is the synopsis of our sample research paper on Firewalls and Intrusion Detections. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 8 page paper describes why it's necessary to protect computer systems and the kinds of attacks they may experience, and how firewalls and intrusion detections systems work.
Page Count:
8 pages (~225 words per page)
File: D0_HVNetSec.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
threat to a companys proprietary information; it can even be a threat to a nation. I will never understand the mindset of the people who think its funny to
destroy months of someone elses work; or what the jerk was thinking who took down a 9-1-1 emergency number; but obviously theyre out there. Whether theyre disgruntled employees, terrorists
or just kids doesnt really matter, what matters is that theyre getting into other peoples computers without permission and doing serious damage. Since its almost impossible to track these
people down, its necessary for people to protect their own systems. This paper describes why its necessary to protect computer systems and the kinds of attacks they may experience,
and how firewalls and intrusion detections systems work. Why All This Stuff is Necessary The instant a computer is connected to the Internet it becomes vulnerable to attacks,
misuse or other undesirable intrusions (Privacy guide, 2000). An intrusion is an action that is "performed to compromise the integrity, confidentiality or availability of the resource and [is] relative
to the security policy" implemented by the system owner (Privacy guide, 2000). Heres an example: if someone is running an anonymous ftp server that provides access to specified
files for anyone, anywhere, who wants them, the system wont recognize anonymous ftp connections to the server as intrusions-thats what its supposed to handle (Privacy guide, 2000). But if
the server is supposed to handle only internal requests, "any external ftp connections to it would look at least suspicious" (Privacy guide, 2000). Although most people think that attacks are
confined to large companies and service providers, the truth is that anyone who connects to the Internet is vulnerable and experiences, on average, 2-10 intrusions per day (Privacy guide, 2000).
...