Here is the synopsis of our sample research paper on INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 5-page paper focuses on how to prevent humans from compromising Internet security. Bibliography lists 7 sources.
Page Count:
5 pages (~225 words per page)
File: D0_MTinsectec.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
harm. This is why companies have stepped up to put more and more security gizmos on their computers and their network systems. Problem is that, a lot of times, security
is compromised by the people who actually use the Internet. The question well try to ask here is how to ensure that solid Internet security technologies arent compromised by the
very people who use them. The first step is to understand why employees (and other users) avoid using Internet security tools in
the first place. One survey recently conducted among employees of companies that rely on the Internet found there was a simply reason why employees dont follow security - theyre not
familiar with the rules (Goodchild, 2008). Though the employees were familiar with their companies security policies, a lot of those policies had gray areas (Goodchild, 2008). For example, companies might
insist that employees dont use certain applications or certain websites, they need to ensure the points are clear upon hire, and that tools are in place so breaches dont happen
(Goodchild, 2008). If, for example, employees arent supposed to use gmail, then dont put it on the system. What also happens is that employees sometimes believe that security is a
hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wait 20 minutes for IT to get back to her
with a response will likely write that security password down in a place where she, and about a thousand other people, will be able to find it.
And sometimes people are just careless when it comes to passwords and other security methods. A part-time hacker and full-time security consultant says he uses
...