0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
About
![]() |
![]() |
![]() |
||||
Senior Paper |
|
![]() |
||||
administrators on the subject, I first feel it is beneficial to explain my background and how I came to be interested in security. I will briefly outline my motivation for becoming involved in security and then will finally come back to the term "security" by trying to define it. Once this framework is established, I will progress to citing the challenge(s) facing security today and then discuss some possible remedies.
which I was given access to a UNIX system. After playing with the system, I became increasingly aware of what is now termed the "underground," which is associated with "hackers" and "crackers" and "phreaks." security, specifically, was because of a former friend of mine. While doing a CS programming assignment in the lab one night, I encountered Brian and asked what he was doing. He explained that he was working on setting up a contract for pirating software. After asking many questions about this practice and concluding that it was illegal and unethical, I began to work to find out more about his operation with the hope of blowing the whistle on him. Though I was never able to collect any firm |
![]() |