Here is the synopsis of our sample research paper on Preventing the Abuse of Information Technology. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
14 pages. Information technology is a wonderful resource for today's world but along with it comes the abuse that is becoming a major concern. Individuals use expired passwords, viruses, phone lines and router ports to gain access to organization's systems. This paper will detail some of the preventative measures that can be used to make organization systems more secure against the use of hackers and the abuse of information technology. Bibliography lists 8 sources.
Page Count:
14 pages (~225 words per page)
File: D0_JGAitabu.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
ports to gain access to organizations systems. This paper will detail some of the preventative measures that can be used to make organization systems more secure against the use
of hackers and the abuse of information technology. INTERNET ABUSE Today it is common knowledge that hackers are easily able to use expired passwords, viruses phone lines and
router ports to gain access to private information. We might think our computers are secure because, after all, they are in our home or office and only we might
have access to them - but anything that goes over phone lines, through cable, or wireless systems is available for a hacker to steal. Many people dont realize
the ease with which many technology buffs, or hackers, are able to tap into our private conversations and Internet information. Their ability to do this gives them admittance to
everything we do over the Internet: access to our credit cards, personal information, bank accounts and anything else we utilize online can become a treasure trove of illegal activity for
the hacker. As with most other entities that offer distinct advantages, they are typically balanced by at least some level of disadvantage. In the case of computers and Internet
access, loss of privacy represents one of the biggest concerns. Empowering the individual with the opportunity to protect his own privacy is one manner in which people are addressing
the issue of computers and privacy. Indeed, there is no such thing as privacy on a computer. Internet users are given the option of accepting or refusing cookies
(instruments of collection that automatically transfer private information to the web site) by programming their computers to prompt before continuing. As well, industry boycotts are being conducted against those
...