Term Paper Undergraduate 411 words Human Written

Space Answering the Following: Can We Ever

Last reviewed: ~2 min read Technology › Natural Disasters
80% visible
Read full paper →
Paper Overview

¶ … Space Answering the Following: Can we ever protect a facility 100% given all the security tools available? Discuss. Although 100% protection may be a laudable goal, and a personal and ideal 'benchmark' for any theorist of computer encryption and protection technology, it is not a realistically feasible one, given that, no matter...

Writing Guide
Mastering the Rhetorical Analysis Essay: A Comprehensive Guide

Introduction Want to know how to write a rhetorical analysis essay that impresses? You have to understand the power of persuasion. The power of persuasion lies in the ability to influence others' thoughts, feelings, or actions through effective communication. In everyday life, it...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 411 words · 80% shown · Sign up to read all

¶ … Space Answering the Following: Can we ever protect a facility 100% given all the security tools available? Discuss. Although 100% protection may be a laudable goal, and a personal and ideal 'benchmark' for any theorist of computer encryption and protection technology, it is not a realistically feasible one, given that, no matter how stalwart the protections of passwords, anti-virus software, and up-to-date firewalls may be, hackers are often equally adventurous. (Kaufman, et. al. 2002) At times, the more secure the system, the more attractive it is to the 'sporting' hacker.

Also, popular systems may be more attractive to attacks, even though it is necessary to use such systems to exchange data between different branches of an organization. (Newman, 2002) Lastly, every concession to access and efficiency means some security concession. Always, a balance must be struck, and thus 100% protection cannot be a true goal, because one must always balance security needs, economic and efficiency needs, and the information sharing requirements of the organization and system being analyzed and protected.

(Pfleeger, 2002) Are natural disasters really security issues and are there cost effective solutions given their rare occurrence? Although not strictly a national disaster, or even purely a computer-related disaster, the recent widespread power outage of 2003 in New York City and Northern New Jersey highlighted for many individuals, computer users among them, the dangers of an over reliance upon technology and the need for better security and backup of computer related systems. But given the rare occurrence of such scenarios, one is tempted to mitigate their potential seriousness.

However, even if "Corporate Security on the Internet," (February 2002) and "Enterprise Wide Security on the Internet" (March 2002) that result in system failures are not strictly problems related to structural security defects within the system or problems with the permeation of encryption, they can cost the loss of necessary funds, investment dollars, as well as splitting workplace headaches. A data backup system, a generator to preserve.

83 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
6 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Space Answering The Following Can We Ever" (2004, July 11) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/space-answering-the-following-can-we-ever-174859

Always verify citation format against your institution's current style guide.

80% of this paper shown 83 words remaining