Free Research Papers On Computer Security
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.
Formation of Security Management Policy and Risk Management Effects
An 18 page paper discussing issues that need to be addressed when forming security risk management policy. The very essence of developing an effective security policy is dependent in great extent to the level of risk that exists. It has been demonstrated repeatedly that network and computer administrators face the threat of security breach each day. Building security is less predictable, particularly as groups of fanaticals place their energies into dreaming up increasingly grand plans for murdering innocents by the thousands. Those responsible for forming and implementing security management policy must be aware of the types of risk faced by the organization and then control for contributing factors. The paper discusses management of risks that are both physical and informational. Bibliography lists 17 sources.
Dell Computer's Corporate History
5 pages in length. The year 1984 marked the beginning for the country's largest direct seller of personal computers. Michael Dell first began constructing his company from his dorm room at the University of Texas-Austin, often taking drastic measures -- such as hiding his computers in the bathtub -- to make sure that no one suspected his sideline. The business that emanated from this dorm room eventually became known as Dell Computer Corporation in May of 1984. The writer chronicles the growth and development of Dell Computer Corporation. Bibliography lists 5 sources.
PC's History and Impact
7 pages. Personal computers have come a long way since the seventies, the eighties, and even within the last five years. Because technology is changing at such a rapid pace we have seen personal computers impact our lives in many different ways. Socially, economically and industry-wise the personal computer and its history are described in this well-written and concise paper. Bibliography lists 7 sources.
Computer Viruses 'Cyber Ethics' and Personal Responsibility
A 10 page discussion of the problems presented with computer viruses. The author contends computer viruses cause tremendous societal harm on both macro and micro levels. The thesis is presented
that while the creation and intentional perpetuation of computer viruses is ethically
and morally wrong, and even subject to the same societal provisions for legal punishment as is any other type of crime, we must take increased personal and societal responsibility for the abatement of the practice. Bibliography lists 11 sources.