Here is the synopsis of our sample research paper on Why Passwords and Good Information Security Technologies Are Compromised by Users. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
In three pages this paper discussed why in a corporate an/or business environment passwords and decent information technologies that are in place are still compromised by the people who use them and also considers how information security can be improved. Four sources are cited in the bibliography.
Page Count:
3 pages (~225 words per page)
File: TG15_TGpasscomp.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
the handiwork of cybercriminals (Perkins, 2006). The other half that are far more commonplace are the result of compromises by users within the organization due to either "human error,
poor procedures, or employee theft" (Perkins, 2006, p. 15). No matter how impressive the security system a business or government organization has in place, users pose the greatest threat
to information security and according to Webroot Softwares vice president of threat research Richard Stiennon, the average administrator routinely spends several hours repairing the spyware or virus damage caused by
a user downloading a program or application from the Internet that contains infectious malware capable of penetrating through the most sophisticated systems (Garcia, 2005). The cases in which these
types of situations occur are commonly in a large corporate setting in which numerous computers are linked by a single network and also government agencies or subcontractors (such as aviation,
engineering, or defense plant) that require strict security clearances, numerous codes and passwords to access confidential protocols or documents. In these environments, passwords are changed frequently in order to
ensure sensitive information remains classified. HOW PASSWORDS AND INFORMATION SECURITY TECHNOLOGIES CAN BE COMPROMISED: In these business and government contractor cases, there are four critical factors that affect
the proper usage of passwords: Multiple passwords; Password content; Perceived compatibility with work practices; and Users perceptions of organizational security and information sensitivity (Adams and Sasse, 1999, p. 40).
For example, employees of a national defense plant that are working on engineering blueprints and technical manuals for military vehicles work on various computer applications and therefore it is incumbent
upon users to remember several passwords for a single project that requires various applications (Adams and Sasse, 1999). The greater the number of passwords a user has to remember,
...