Up late at night with your essay due tomorrow morning and you are out of ideas to write about? Don't worry, EssayZoom is here!
We have a database of over 40,000 essays that are available immediately for you to search and print. Get enough examples and ideas
from tens of thousands of other writers to make your own term paper stand out above the rest of the class. Join now
for instant access to the essays
Here is a short summary of the essay
Computer Security
Beginning of Essay
First, we have to understand these type of computer crimes such as below because they will let us know the computer crimes often happen in our lives.
1. unauthorized use, access, modification, copying, and destruction of software or data (Bill Smith, the computer .... Middle of Essay .... trend of unauthorized access is from 1996 to 1997 from the tables below.
Table 1
Companies reporting financial losses attributable to specific types of high-tech criminal activity and other factor in 1996-1997.
Factor Percentage
Virus Infection 65%
Laptop Theft 57%
Abusive Use Of Internet 31%
Unauthorized Computer Use 16%
Telecommunications Fraud 16%
Information Theft 14%
Financial Fraud 12%
Sabotage 11%
Network break-in 8%
source: computer security institute survey for the FBI (McCollum 9).
Table 2
SECURITY BREACHES
Companies' responses when asked if their computer systems had been used without authorization.
1996 1997
YES 42% ....
Membership Type |
Price |
Instant Access |
30 days (recurring) |
$19.95 |
90 days (recurring) |
$39.95 |
180 days (non-recurring) |
$69.95 |
|
|
|
Words: 826 - Pages: 4
|