Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Amount Of Information Due To The Fact - 1,438 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

The Internet is a wondrous place. Practically anything you could ever want is available on the Net. Its like a big city, it has the highly prestigious areas, and the sex-ridden slums (Mitchell). It has the upstanding citizens, and it has the criminals. On the Net, crime is more abundant than in a large city, though, mainly because of the difficulties in tracking and prosecuting offenders. Even from its beginnings, the Internet has always been a battlefield between phreak's and administrators.

The Internet hasnt always been a public forum. In fact, the Internet has been around for years. The Internet is just a new fad (Larson). The Internet originally began as DARPANET, a government-created network, which was designed for defense communications. The Net structure is such that it could survive a nuclear war (Mitchell). The creation of the Net can not be blamed for the existence of hackers though, hackers are older than the Net itself, but the Net is the largest hacker haven today (Spencer).

The growth of the Net since its creation has been nothing less than astounding. In the 25 -plus years since its creation, the Net now has over thirty million users using four million sites world wide. Estimates rate the growth of the Net anywhere from ten to fifteen percent per month (Spencer). The Internet was first released to major universities in the United States of America. Since then, the universities have offered connections to small business, service providers, and even to the individual user. Sometimes these connections cost a fortune, and sometimes they can be obtained for free (Larson).

Although some of the original universities have dropped off the Net for various reasons, every major university in the United States, and now, most others in the world, have a connection to the Internet (Quittner). Although it isnt easy for an individual to get a direct connection to the Net, many private institutions are getting direct access. This is mainly due to the fact that in order to support the very high speed of the Net, a fast computer is needed and a fast connection. A fast computer can cost in the thousands of dollars, at least, and a quick connection can cost hundreds dollars or more. Individuals can still get on the Net through these private institutions. The private institution spoon-feeds the Net to the slower computers over their delayed connection lines (Jones).

The Internet began very high-class, due to the fact that only super intelligent college students and professors could access it. The discussions tended to stay intellectual, with very little, if any, disturbance (Larson). However, relatively recent changes in the availability of the Net have changed that atmosphere. Now, almost anyone can access the Internet. Internet access is offered by every major online service (Himowitz).

The fact that the major online services charge for their use keeps many people away from them. Those people simply turn to public dial-ups, which are free connections offered by universities that are available to the general public (Spencer). Because accessing the Net is easier, and a lot more people are doing it, naturally the amount of information on the Net is increasing at the same rate, if not faster. In what is often referred to by Net users as the Resource Explosion, the amount of information circulating the Internet has increased with the number of users (Jones). Of all the other factors contributing to the large percent of online crimes, perhaps the most influential is the design structure of the Internet. Experts agree that the underlying structure with no central hub, where each computer is equally powerful, gives unchecked power to the undeserving (Miller).

The design also makes controlling the frequency of break-ins almost impossible as well. Both politicians and so-called experts believe the Internet as a whole will be regulated in the next five years. Hackers disagree, using the arguments that the Internet was designed to be uncontrollable, that the basic structure doesnt support regulation (Banja). In a network run by its users, which is designed to be impervious to attack, not even the government has much muscle there.

In fact, the Internet is one of the few places that the government has little power. Because the Net is international, any regulations forced upon domestic computer users can be circumvented by routing through an overseas computer (Savage). The government doesnt have the power to completely shut down the Net. In order to do that, every one of the millions of computers on the Net must be disconnected.

Even if only two remain, the Net will continue to exist (Miller). The ease of adding something to the Net is also a factor preventing the total regulation of the Net. A new site can be added to the Net in a matter of seconds, and can be removed just as quickly. It takes authorities considerable time to trace a connection back to its physical address, and if it disappears, it makes tracking it all that more difficult. (Johnson) Once a resource becomes widespread, removing it from the Internet is almost impossible. Each site that has the resource must be found and the resources moved. If even one site has the resource, it can spread to cover the Net easily (Himowitz).

Some computer criminals go by the term? Phreak's? , or? Hackers. ? With all these things leaving the Internet open to?

phreaking? , is it any wonder that so many computer law breakers exist? The United States government has all of its computer systems on the Internet, yet many universities have better security than the government computers containing confidential information (Spencer). A majority of break-ins occur in university computers, mainly because of the stiff penalties for being caught in a government computer (Fisher). Over 10, 000 break-ins that have occurred in recent months are blamed on The Posse, a group of young phreak's (Quittner). If break-ins are done on universities, then how secure are the governments secrets?

Both hackers and partakers tend to stay away from heavy-duty government hacking, though. Exploring innocently and generally harmless pranks are done the most, and many hacks / phreak's dont limit themselves to the Internet, or even to a computer (Spencer). The next step up for a good computer hack / peak is to field phreaking, which covers many various activities, but mainly using telephone company boxes to make free calls and other various things, but most field phreaking is somehow technically related to their computer skills (Jackson). Field phreaking does happen, and it does happen quite a lot.

For example, when two bachelors rented a billboard in hopes of finding a mate, a peak broke into their voice mail box and changed the message to a perverted sexually suggestive message (Jones) More recently, a hacker obtained tens of thousands of passwords using a Trojan horse program, which records the first 128 keystrokes when someone connects to the Internet. These 128 keystrokes normally contain the users name and their password (Himowitz). Kevin Lee Poulsen was featured on Unsolved Mysteries in 1991 for charges including tampering with the telephone network and stealing government documents, all via computer. Because of this appearance, he was captured by two bag-boys in a Hughes Supermarket who saw his picture on the show (Fisher).

Tonya Harding's E-mail in the Olympic computers was open to the public since she never changed her password from its default, 1112, which corresponds to her birthday, December 11 th (Nevis). Mark Above, whom many believe to be the greatest peak ever, who is known online as Phiber Optik, was sentenced to one year in prison, a stiff punishment for his charge of breaking into a telephone network (Johnson). Although the job is hard, there are groups devoted to stopping violations committed online. One such group, the Computer Emergency Response Team, or CERT, a government-funded team at Carnegie-Mellon University gives advisories and support to systems that have been broken into or are at risk of being broken into (Mitchell). Another method of preventing break-ins are new security measures. Almost every day, another operating system or communication protocol comes out which covers holes found in previous copies of the software.

This is good as a temporary solution, but as soon as the new software comes out, a new hole is found and the game continues (Larson). Stopping computer hacking is probably impossible, although undoubtedly stopping hacking altogether is impossible. Why? Because many professionals spend millions of dollars to prevent break-ins, but smaller systems dont spend anything. Free security will never be able to hold everyone out. FtS Productions said it best in Avoiding Detection: Free Security?

You get what you pay for.


Free research essays on topics related to: private institutions, telephone network, break ins, amount of information, due to the fact

Research essay sample on Amount Of Information Due To The Fact

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com