Research Paper On Hacking Techniques

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Hackers and Hacking

    Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by examining the scope and scale of hacking. The way hacking may take place is then discusses, and finally environmental influences that help to turn IT students into hackers is discussed. Five sources are cited in the bibliography of this three page paper.

  • SQL Injection Attacks

    A common form of hacking is the SQL injection attack. The paper looks at how this attack is used and what vulnerabilities exist in systems that make this form of hacking so common. The writer looks at this with an example; the hacking of Nokia in 2011. Eleven sources are cited in the bibliography of this nine page paper.

  • Overview of Computer Security

    In ten pages this research paper focuses on computer security and its breaches with statistics covering its type, incidences, and losses for 1998 along with security techniques to protect computers against hacking along with improvement recommendations. Six sources are cited in the bibliography.

  • Crimes Committed by Computers

    In twelve pages this paper examines computer hacking and traces its origins back to the 1960s and includes a discussion of John 'Captain Crunch' Draper who hacked into phone company lines in the 1970s along with other relevant topics considered pertaining to cyber crime. Fifteen sources are cited in the bibliography.

  • The Ethics of Hacking

    An 8 page overview of computer crime related to hacking. This paper explores the ethics and justifications of hacking, dismissing those justifications as simply illogical. Bibliography lists 9 sources.

Copyright © 1994-2021 The Paper Store Enterprises, Inc. & Research Papers Online. All rights reserved.