Viruses

Essay specific features

 

Issue:

Technology

 

Written by:

Jamie S

 

Date added:

August 16, 2013

 

Level:

University

 

Grade:

A

 

No of pages / words:

9 / 2459

 

Was viewed:

5229 times

 

Rating of current essay:

 
Essay content:

Crackers and hackers typically break into systems by connecting to them via modems and logging in as a user. Some do no damage, but merely wander around the system before logging off, while others leave some evidence of their presence by either leaving a message or altering data. Unauthorized use is the use of a computer system or computer data for unapproved or possibly illegal activities...
displayed 300 characters

Order custom writing paper now!

  • Your research paper is written
    by certified writers
  • Your requirements and targets are
    always met
  • You are able to control the progress
    of your writing assignment
  • You get a chance to become an
    excellent student!

Get a price guote

 
 

This may range from an employee using the database for personal activities to gaining access to a bank system and completing an unauthorized transfer Human threats are perpetrated by a person or groups of people who attempt to penetrate computer systems through computer networks, public switched telephone networks or other sources...
displayed next 300 characters

General issues of this essay:

Related essays: