Here is the synopsis of our sample research paper on THE SUSCEPTIBILITY OF MICROSOFT TO VIRUS INFILTRATION
. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper discusses the vulnerability problems in Windows by Microsoft. Examples, projections offered. Bibliography lists 2 sources.
Page Count:
3 pages (~225 words per page)
File: D0_MBnetwork.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
of Microsoft computer programming system. Unfortunately, the dark side of that shining star called Microsoft is that it, alone, seems more vulnerable to attack than any other operating system out
there. For the most part researchers are baffled, but there are some indications as to what it might be which will eventually lead to some definitive answer as to why
Microsoft seems to be the primary target for viruses and worms. Windows seems to be loaded with security flaws and this susceptibility to all sorts of viruses, worms, and
Trojan horses have caused users more time and money fighting them and correcting the damage they inflict. Macs, for instance, are not as susceptible, which leads one to wonder what
the difference might be. The first difference is obvious right off the bat. The Mac is built on Unix, which most educational and scientific groups utilize. The OS X will
not allow certain core files to be altered(Roberts 2003). The option is not even offered. Windows XP users are given the keys to the kingdom, so to speak, and in
doing so are having their keys stolen. Another problem that leaves Windows open for vulnerability is that it leaves ports open. These conduits which receive the commands from the various
networks are closed so that no outside commands can usurp the original. Windows is kinder and gentler and as a result its open door policy is causing real headaches. Paul
Roberts reports for CERT said that "The buffer overrun vulnerability in the Workstation Service, a Windows component, is well suited to exploitation by an Internet worm and would allow malicious
hackers to remotely attack and compromise vulnerable systems"(Roberts, 2003). Of course, Microsoft is countering the problem by producing yet another patch for users. But, this has left many owners and
...