hackers

             Precis of 'Who's reading your E-mail" by Richard Behars
             The article exposes the vulnerability of computer data and of
             corporations with the popularity of the Internet. The Internet can
             allow hackers access to any computer in the world, with understated
             ease. Break-ins can go virtually undetected
             Major corporations and government security departments have
             acknowledged that hacker break-ins are out of control. Some companies
             are too fearful to join networks because of this. Software programs
             brought out to deal with the growing problem, such as firewalls, are no
             longer totally effective. New technology has been developed such as
             ''Pilot Network Services' (offering supervised Internet access);
             'Netranger' (a monitor device used by Pentagon) and 'Encrypton'
             The basics of computer security (using difficult passwords, and
             guarding of data) are not being met in a disturbingly large number of
             American companies surveyed. A new bill demands that system operators
             become responsible for security. Hackers can be prosecuted (with
             subsequent heavy penalties) only if the exposed company has actively
             shown that it was security conscious. Further more, exposed companies
             are liable to other companies if their lack of security precautions
             allowed their computer network to become an opening for other company
             Companies are dis-inclined to report breaches in security as it denotes
             a poor image and highlights their vulnerability. Clients demand
             security, and lack of it will send them elsewhere.
             Billions of dollars annually is spent on protection devices. Others are
             utilizing the expertise of former convicted hackers to fine tune and
             update their security features. It is a case of befriending the enemy
             in order to learn more. These hackers come out of goal with a ready
             market for their expertise, and great financial rewards.
             The explosion of the Internet use, and networks around the world have
             brou...

More Essays:

APA     MLA     Chicago
hackers . (1969, December 31). In MegaEssays.com. Retrieved 06:56, March 28, 2024, from https://www.megaessays.com/viewpaper/66703.html