Here is the synopsis of our sample research paper on INFORMATION TECHNOLOGY: SECURITY BY ADMONITION. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3-page paper focuses on the effectiveness of security by admonition. Bibliography lists 3 sources.
Page Count:
3 pages (~225 words per page)
File: D0_MTsecitadm.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
or install. "It," of course, is a little pop-up box, asking a user if he/she wants to download and run software. Or "it" could be a pop-up box warning the
user that a particular Internet site hasnt been validated as "Safe." Many times, the user shrugs away annoyances, presses the "yes" button with the mouse, and moves on with the
download or browsing activity, unaware that he/she has just encountered a passive security system. This is called security by admonition, and since being built into Microsofts Word for Windows systems
during the early 2000s, its meant as a deterrence -- at least, kind of. The concept behind security by admonition is that
it makes the user think before pressing that key, giving the user a final out of "are you REALLY sure you want to okay this download?" Its believed that most
users are rational and will not willingly invite malicious codes or hackers into their systems. But how does admonition end up becoming an important part of a companys IT security?
And is it effective? Admonition: An Overview Miller (2008) points out that the goal of any kind of computer safety, or security,
is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points out there are many given level
of risks, and breaks these levels into prevention, deterrence and admonition (Miller, 2008). Prevention provides safety by making danger impossible -- providing assumptions and caveats that need to be explicit
for the system to follow (Miller, 2008). The next level is deterrence, and it discourages any type of attack by ensuring that its not in the attackers best interest to
...