(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Computer Underground


            The Computer Underground: A Modern Threat to Computer Security.
             The meaning of the word "computer" appeared in the dictionary long before many knew what a computer was. However, in today's society, most people need to know what a computer is as well as understanding how to use one.
             Computers are gaining more and more popularity. Society has become increasingly dependent on them. Everyone at some point in life will interact directly or indirectly with a computer. Computers can be used almost anywhere and are becoming increasingly useful and helpful in everyday activities. Computers make people feel confident and secure. With a computer, one can buy products, pay bills, book an airline flight, and perform a variety of transactions from bank accounts and investment firms. Computers also allow for the storage and retrieval of large amounts of important information and data through the use of a hard drive. This is the part of a computer where all data is kept.
             The hard drive of a computer is the most valuable part and if not properly safeguarded, can be damaged an/or destroyed by a variety of hazards. It could be anything from human negligence, natural disasters, or an invasion by one of the most common problems of computers, the computer hacker, also referred to as the computer underground (CU). The term hacker or CU can have many meanings. The most visible and known to the public is the person pirating software and breaking into network computing systems, destroying information. The Cu is composed of relatively intelligent people. Hackers are often described as being sociopath or malicious, creating a media image of the computer underground that may exaggerate their ability for causing damage when it has never been accepted in society. In fact, it was a collection of newspaper an film clips that were presented in the United States Congress during legislative debates as evidence of the computer hacking problem (Hollinger and Lanza-Kaduce, 1988 p.


Essays Related to Computer Underground


Got a writing question? Ask our professional writer!
Submit My Question