Research Paper On Hacking Techniques

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Crimes Committed by Computers

    12 pages in length. That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. The 1960s, however, is where the timeline of contemporary hacking gets its start, continuing on into the 1970s with John Draper – aka Captain Crunch – hacking the phone company by mimicking the tone that opens a line. By the 1980s, hacking had become much more sophisticated as a vast new entity called 'cyberspace' was introduced to the world. Bibliography lists 15 sources.

  • The Ethics of Hacking

    An 8 page overview of computer crime related to hacking. This paper explores the ethics and justifications of hacking, dismissing those justifications as simply illogical. Bibliography lists 9 sources.

  • SQL Injection Attacks

    This 9 page paper looks at a recent hacking attack to assess the cause and impact. The event examined is the SQL injection attack on the Nokia Developer Forum in August 2011. The event is outlined including an examination of and the method of hacking using the injection of malicious code into an open part of the system. The vulnerability is explored and action which may be taken to prevent SQL injection attacks being successful are also considered. Tne bibliography cites 11 sources.

Copyright © 2000-2024 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.