Custom Research Paper Writing
End Paper Writing Worries

Call us today to learn more:


  • 24/7 Customer Service
  • Free Plagiarism Check
  • Writing at Your Level
  • Native US Degreed Writers

Order Here

Information Security Research Papers

Certainly one of the most important topics of the 21st Century is information security. As long as there is the Internet and the Cloud, information security will be a serious issue. In fact, students that go into the field of information security will have a wide range of job opportunities available to them. Get help today in learning about how information security is a serious issue.

An Information Security term paper briefly reviews the growth of Internet use and the rise in information security and breaches of security that have accompanied it. In addition, it provides a general overview of information security, including the following:

  1. Internet security
  2. Encryption
  3. Use of certificates

As long as people are involved with processing information there will be a need for constantly improving the protection of such information. Information Security

The past few decades have been called the Age of Information because of the growth of information technology, falling prices and increasing performance of computers, as well as the storage and dissemination of information going with the advances in computer technology. Although the Internet enables millions of people to conduct affairs on-line, it has also become a modem in which hackers can easily access information. Individuals, businesses, and even the government provide vital information via on-line communications, such as Social Security numbers, taxes, phone numbers, health records, and credit card numbers.
Demand for Internet use for transmitting financial, business and other sensitive information has led to the need for a means to insure the security of that information.  This paper discusses Internet security, information security, various types of encryption technology, with secure socket layers (SSL) as the most common type, and also authentication certificates issued by various certificate authorities (CAs), which operate to identify individual Internet users and servers.

With the fall of Soviet communism and the end of the Cold War, threats of invasion quickly diminished. United States security measures involving the networking of extensive computer systems became unnecessary, so the U.S. provided public access to this networking, or Internet.

During the early 1980s, before the advent information security, company networks were often at the mercy of any “unauthorized user who had obtained a valid password could get into any computer system –for profit or for fun—from anywhere in the country, revealing the need for Internet security. Between 1992 and 1996, there were an estimated 1.2 million Internet break-ins.

Related Research Paper Topics

Outsourcing Information Technology - How Technology Has Changed Your Life term papers explain how today's technological advances have impacted your life in light of information security.

National Security Agency - National Security Agency research papers examine the United States intelligence organization charged with the task of monitoring, collecting, decoding, and analyzing information from around the globe.

Cyber Security - Cyber Security research papers discuss the continuing effort to protect electronic data and computer systems from unwanted intrusions.

Wireless Networking - Research paper examines the historical evolution of various Wireless Networking technologies.

Technological Literacy - Research papers on technological literacy report on the ability of any person, working either individually or with a group, to effectively and appropriately use technology for a wide variety of purposes.

Cryptography - Research papers on cryptography and discuss the study of strategies to create secure communication messages that conceal their true meaning from enemies or other prying eyes.

Identity Theft - Identity theft is the fastest growing and most costly crime in the United States.

Authentication Certificates - Authentication Certificates research papers explore information security through encryption techniques and encryption technology.

Encryption Techniques - Encryption Techniques research papers explain what encryption is and various techniques for encrypting data.

Cloud Computing Security - Cloud Computing Security research papers examine the emerging field in computer security, designed to protect data and information within the infrastructure of cloud computing.