paraphrase 113

I need to paraphrase these but do not summaries or cut the content

I took them copy past from the internet I want to remove the plagiarism

it is 2 and half pages long

please let me know if you are willing to do it within less than 7 hours

In the United States, there were an estimated 30 million surveillance cameras in the United States in 2011. Video surveillance has been common in the United States since the 1990s; for example, one manufacturer reported net earnings of $120 million in 1995.With lower cost and easier installation, sales of home security cameras increased in the early 21st century. Following the September 11 attacks, the use of video surveillance in public places became more common to deter future terrorist attacks. Under the Homeland Security Grant Program, government grants are available for cities to install surveillance camera networks. In 2009, there were an estimated 15,000 CCTV systems in Chicago, many linked to an integrated camera network. New York City’s Domain Awareness Systemhas 6,000 video surveillance cameras linked together, there are over 4,000 cameras on the subway system (although nearly half of them do not work),and two-thirds of large apartment and commercial buildings use video surveillance cameras. In the Washington D.C.-area, there are more than 30,000 surveillance cameras in schools,and the Metro has nearly 6,000 cameras in use across the system.

1.2. Computer Security (Intrusion Detection):

Today, Computer security, IT security or cybersecurity used to protect computer systems from theft or damage to their hardware, software or information and electronic data, as well as from disruption or misdirection of the services they provide. Moreover, the field of computer security is growing due to increasing reliance on computer systems, the wireless and internet networks such as WI-FI and Bluetooth and due to the growth of smart devices, including smart phone, televisions and the various tiny devices that constitute the internet of things. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible threats and violations of computer security policies, standard security practices, or acceptable use policies.

2.1. History of Monitoring:

Barry Steinhardt of the ACLU Technology and Liberty Program said, “Keystroke monitors destroy boundaries between and employer’s facilities and the employee’s personal business” This issue about keyboard monitoring software comes from issue 5-1 on page 5.04. Keyboard or keystroke monitoring software is an application program that captures the signals that move between the keyboard and the computer and then it stores all the keystrokes in a file on the computer or it sends them to a remote user. I think that keyboard monitoring software is good and that it should be used at work or at home with the knowledge of the user. Many people say this is an invasion of privacy and they don’t think keyboard monitoring software should ever be used.

If some people say it is bad, should keyboard monitoring software ever be used? If so, when? I think that keyboard monitoring should be used both at home and at the workplace. It is good to use at home because a person could check what a child or spouse is doing. Most of the software coming out now has five monitoring tools all in one, they can simultaneously monitor

  • Email
  • Chats or chatrooms
  • Keystrokes
  • Instant messaging
  • Websites

Now people will say that monitoring is an invasion of privacy or that there should be trust from the spouse or child and I would agree but I also think monitoring is good if the user is told the software is installed. I also think that the keyboard monitoring software should be used in business because when you are at work you are on their time and equipment.

Some businesses like financial institutions, don’t have the option whether or not to monitor they are required to, but the company should use judgment and talk to the user if any incidents occur and not just accuse them outright. This software should be used right now because it will help protect both family and business. Of course, it is up to them to decide if they want to use the software or not but I think it is beneficial.

Some of the makers of the software recommend the computer user be informed about the installed software. Is this good? I think if the home user is told that the program has been put on the computer then there is less of a chance for problems to arise later on. I also think that the business user should be informed that the software is on the computer. That way they know anything they write on that computer that is questionable the company will see it and so they don’t waste the companies time and money. It is a good thing that the people who make the software even recommend the user be informed it shows thinking on their part that some serious problems could come up if a user does not know that what they type on the computer is being recorded.

In the mid 1970s, the Soviet Union developed and deployed a hardware keylogger targeting typewriters. Termed the “selectric bug”, it measured the movements of the print head of IBM Selectric typewriters via subtle influences on the regional magnetic field caused by the rotation and movements of the print head. An early keylogger was written by Perry Kivolowitz and posted to the Usenet news group net.unix-wizards,net.sources on November 17, 1983. The posting seems to be a motivating factor in restricting access to /dev/kmem on Unix systems. The user-mode program operated by locating and dumping character lists (clists) as they were assembled in the Unix kernel.

In the 1970s, spies installed keystroke loggers in the US Embassy and Consulate buildings in Moscow and St Petersburg. They installed the bugs in Selectric II and Selectric III electric typewriters.

Soviet embassies used manual typewriters, rather than electric typewriters, for classified information—apparently because they are immune to such bugs. As of 2013, Russian special services still use typewriters.

The ‘80s and particularly the ‘90s also saw the development of network monitoring tools such as nmon, MTRG, and Big Brother. While desktop monitoring tools could generally afford to focus on a single system and a single user, network monitoring tools faced a broader challenge. They had to keep track not only of the performance of the network hardware and network management software, but also the activities of multiple users.

This meant monitoring the health and performance of multiple physical communication interfaces, as well as the server hardware and system resources, while at the same time providing the kind of traffic data that would allow the system to adequately manage the user load.

Recently, the FBI used FlashCrestiSpy to obtain the PGPpassphrase of Nicodemo Scarfo, Jr., son of mob boss Nicodemo Scarfo. Also, the FBI lured two suspected Russian cyber criminals to the US in an elaborate ruse, and captured their usernames and passwords with a keylogger that was covertly installed on a machine that they used to access their computers in Russia. The FBI then used these credentials to hack into the suspects’ computers in Russia in order to obtain evidence to prosecute them.

2.2.1 Screenshot:

A screenshot (or screen grab) is a digital image of what should be visible on a monitor, television, or other visual output device. A common screenshot is created by the operating system or software running on the device. A screenshot or screen capture may also be created by taking a photo of the screen.

2.2.2 History: In 1960s, the first screenshots were created with the first interactive computers. Around the 1980s, computer operating systems did not universally have built-in functionality for capturing screenshots. Sometimes text-only screens could be dumped to a text file, but the result would only capture the content of the screen, not the appearance, nor were graphics screens pre servable this way. Some systems had a BSAVE command that could be used to capture the area of memory where screen data was stored, but this required access to a BASIC prompt. Systems with composite video output could be connected to a VCR, and entire screencasts preserved this way.

3.2.1. Java: Java is a high-level programming language originally developed by Sun Microsystems and released in 1995. Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX. Java is a set of computer software and specifications developed by James gosling at Sun Microsystem, which was later acquired by the Oracle Corporation that provides a system for developing Application software and deploying it in a cross-platform computing environment. Java is used in a wide variety of computing platform from embedded devices and Mobile to enterprise server and superconductors. Java applets which are less common than standalone Java applications, were commonly run in secure, sandboxes environments to provide many features of native applications through being embedded in HTML pages. It’s still possible to run Java in web browsers after most of them having dropped support for Java’s VM.

3.2.2. Swing: Swing is the principal GUI toolkit for the Java programming language. It is a part of the JFC (Java Foundation Classes), which is an API for providing a graphical user interface for Java programs. It is completely written in Java.

Swing is a set of program component s for Java programmers that provide the ability to create graphical user interface (GUI) components, such as buttons and scroll bars, that are independent of the windowing system for specific operating system. Swing components are used with the Java Foundation Classes (JFC ).

Unlike AWT, Java Swing provides platform-independent and lightweight components. The javax.swing package provides classes for java swing API such asJButton, JTextField, JTextArea, JRadioButton, JCheckbox, JMenu, JColorChooser etc.

Swing is a set of program component s for Java programmers that provide the ability to create graphical user interface (GUI) components, such as buttons and scroll bars that are independent of the windowing system for specific operating system. Swing components are used with the Java Foundation Classes (JFC)

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.