Here is the synopsis of our sample research paper on Internet Security. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper briefly discusses a computer attack, and what companies can do to protect themselves against such intrusions. Bibliography lists 3 sources.
Page Count:
3 pages (~225 words per page)
File: D0_HVIntSec.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
Internet also presents problem, particularly when criminals find weak spots and hack into company systems, personal records, or other facilities. This paper briefly discusses a computer attack, and what
companies can do to protect themselves against such intrusions. Discussion Hackers do what they do because they can. They seem to see confidential systems and files as a
challenge to be overcome. That they are usually young is evidenced by their careless thinking: they never once consider that they may be destroying months of someone elses
work, or severely compromising a company, or (in cases of hacking into hospital records and 911 systems) presenting a threat to peoples lives. In the case of Gibson Research
Corporation (GRC), the company was "knocked off" the Internet for 17 hours by a 13-year old kid; the boy was angry with Steve Gibson for something he (the kid) was
told Gibson had said about hackers. Instead of trying to find out what Gibson had really said-which was not what the boy had "heard"-the malicious youngster, known as "Wicked,"
threw the electronic equivalent of a temper tantrum by launching a denial of service attack against GRC. On May 4, 2001, GRC.COM "suddenly dropped off the Internet" (Gibson, 2002).
The company was the victim of a "classic Distributed Denial of Service (DDoS) attack generated by the coordinated efforts of many hundreds of individual PCs" (Gibson, 2002). Gibson
later determined that 474 Windows PCs were involved in the attack, doubtless without the knowledge of their owners. In laymans terms, "Wicked" got upset and used hijacked systems to
launch a barrage of information (in the form of "packets") at GRC, with the result that the companys systems couldnt handle legitimate traffic, thus denying them the ability to serve
...