Used and abuse of nanotechnology discussion


Since the earliest days of humankind, inventions from the wheel to nanotechnology have been used and abused for unethical or illegal purposes. Why would it be any different for computer and Internet technology? In fact, the proliferation of computer exploitation necessitated an entirely new language. Overall, “malware” is software designed to infiltrate or damage a computer system, without the owner’s informed consent. According to Wikipedia, malicious and undesired software such as computer viruses, worms, Trojan horses, spyware, adware and other malicious and unwanted software. In law, it is sometimes called a computer contaminant. In a very short time, malware became so widespread that it developed into a major aspect of computer technology. It raised a host of problems, challenges, dilemmas and questions about security, rules and regulations, prevention and punishment.

Don't use plagiarized sources. Get Your Custom Essay on
Used and abuse of nanotechnology discussion
Just from $9/Page
Order Essay

As soon as computers were understood, there were those who were ready to exploit them. Viruses started appearing on dedicated networks such as the ARPANET in the 1970s. The boom in personal computers, initiated by Apple in the early 1980s, led to a corresponding boom in viruses. As more and more people gained hands-on access to computers, they were able to learn how the machines worked. And some individuals inevitably used their knowledge with malicious intent.

Viruses were one of the first kinds of malware. Like actual biological viruses, these are self-duplicating computer programs that spread by inserting copies of itself into other executable codes or documents instead of living cells (Wikipedia). Viruses range from bothersome to destructive as eliminating data. Important to note is that viruses cannot procreate without the help of human users. People continue the spread of a computer virus, usually without knowing, by sharing infecting files or sending e-mail that contain the virus. Worms, a subset of viruses, spread from one computer to the next. However, they have the ability to travel without any help from a person. A worm uses a file or information transport to move between computers. Blaster Worm., for example, was designed to tunnel into computer systems and allow devious users to control other people’s computers remotely.

Trojan horses sit and wait until summoned by a certain command and then reak avock, such as destroying files, and worms or pieces of software that use computer networks and security flaws to create copies of itself. Some Trojans are created to be more annoying than malicious: They change a person’s desktop by adding inane desktop icons, for instance. Or they can cause serious damage by deleting files and destroying information (Wikipedia).

Robbers steal because it gives them property to sell. Why do individuals write software that hides until awakened and then causes destruction? At first it was for recognition; it was done because it could be done. Soon, individuals followed the traditional purpose of gaining economically through fraud. They can get something that costs for nothing. The first Trojans were created to get onto the Internet through AOL, and later to do the same with games and other paid software. Such theft was and still remains a crime.

Now there are a host of individuals who do this for much larger payback. They steal valuable information, extract money directly from end users, or creating and selling a spamming platform for others. Presently, virus writers either work for particular spammers or sell their wares to those who will pay the highest. Once in the backdoor control is taken of the infected computer and used to be “spam zombie” and send advertising e-mail. They also create Trojan spies that can steal electronic cash from e-wallets, Pay Pal accounts and/or directly from Internet bank accounts. There are also those who threaten organizations, or actually blackmail, that they will conduct a DoS attack against their, such as e-stores, banking and gambling sites (

As with any other human behavior, there are grey areas of right and wrong, which are more unethical than illegal. A threat growing along with the Internet is known as spyware. These applications, unknown to the users, make their way into the computer and allow vendors to track your computer habits and buying interests. The dilemma of the right to privacy vs. The right of companies to acquire data continues.

Many ethic and legal problems presently occur in the realm of the Internet, because the technology has developed faster than the corresponding legal system. For example, the U.S. legal system is just starting to look at and decide on cases concerned with privacy the rights. Especially with spyware, end-users do not like to be monitored and manipulated, while the marketing industry sees these technologies as a tool to reach new customers, gather information that is used to provide the products desired.

In fact, a number of states (National Conference of State Legislators) are now studying or enacting legislation regarding the ethics and legality of spyware. In Hawaii, the law prohibits the unauthorized access to or control of a computer or the inducing, by misrepresentation, authorized person to load software. Authorizes attorney general or prosecuting attorney to seek up to $2,500 per violation. Authorizes private action to recover $5,000 per violation or 5 times the amount of damage cause, whichever is greater.

The Illinois Spyware Prevention Initiative Act, if passed, would prohibit a person or entity other than the authorized user of a computer from causing computer software to be copied onto the computer and using the software to: (1) take control of the computer; (2) modify certain settings related to the computer’s access to or use of the Internet; (3) collect, through deceptive means, personally identifiable information; (4) prevent, without authorization, an authorized user’s reasonable efforts to block the installation of or disable software; (5) misrepresent that the software will be uninstalled or disabled by an authorized user’s action; or (6) through deceptive means, remove, disable, or render inoperative security, antispyware, or antivirus software installed on the computer. Prohibits a person or entity who is not an authorized user from inducing an authorized user to install a software component by misrepresenting that it is necessary for security or privacy or in order to open, view, or play a particular type of content. Prohibits a person or entity who is not an authorized user from deceptively causing the copying and execution on the computer of software components with the intent of causing an authorized user to use the components in a way that violates the Act. Makes a violation of the Act a Class B misdemeanor. Contains severability provisions (National Conference of State Legislators).

In the meantime, each organization has to decide how it will best protect the information it has from potential malware. This was especially noted when the computer system of the major insurance company American International Group (AIG) was victimized from a theft that revealed personal account information of almost one million insurers. This included Social Security numbers and tens of thousands of medical records of potential customers. With $843 billion in assets, even this huge business entity could not completely guarantee safety against malware (Smith, 2006).

Ironically, a large number of the security problems are due to the companies themselves. For example, a laptop stolen from the house of an ING employee in Washington, D.C., held the retirement plan data, including Social Security numbers, of 13,000 city employees. Similarly, a laptop of an Aetna employee, which contained the names, addresses and Social Security numbers of 38,000 Department of Defense and Omni Hotel employees, was stolen after he left it in his car (Smith, 2006).

Too frequently, then, the malware problem is internal more than external. According to the security firm ControlGuard about 70% to 80% of data breaches are committed by company insiders. At the enterprise level, there is an agreement that removal media and portable devices with great numbers of data are unmanaged and unsupervised. As organizations increasingly move towards the adoption of new preventative security products, a debate has arisen concerning the best way of detecting and preventing malicious activity — that is, behavioral rules or Many security products detect malicious attacks, but very few actually take preventive action to handle them once they occur (Franklin, 2002). A new form of security product is developed to detect malware, but also to prevent it from causing damage, without human intervention. However, within the field of preventative security products, opinion is divided over the best way to detect and then prevent hacking activity: signatures or behavioral rules.

A signature is a specific description of a known attack, or a pattern of characters that can be matched against a data stream. For example, a signature searches for the string .. / in an HTTP request to a web server. If the signature matches the characters in the request, the signature triggers a response from the security product. Most anti-virus (AV) and intrusion detection systems (IDS) presently use the signature-based approach for the majority of detection schemes. When a new malware threat is discovered, a specific response or signature is written to ensure the system can recognize and deal with the attack if it happens again (Franklin, 2002)

The advantage of a signature-based approach is that it enables the security administrator to specifically identify an attack. However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious behavior without having to recognize the precise attack used. Thus, there is additional protection against new attacks as they emerge. It is to effectively prevent any unauthorized applications, including malicious code and Trojans. or, it could protect a webserver by making it impossible for anyone to access the webserver to change the files and limiting the risk of a hack (Franklin, 2002).

However, the dilemma comes how many rules should the system have? The security manager must decide between an effective security procedure and a low number of false alarms. Applying too many rules will keep the company from meeting its basic business objectives and becomes very difficult to maintain. However, not using enough rules allows the application to proceed unchecked and potential malicious intrusion. In addition, because computer systems are continually changing, rule and signature changes are necessary for each server with every system change. This makes the rules-based solutions not only inaccurate, but also impractical to use across the enterprise on production systems. If one makes a system more secure, it makes a system harder to use, and vice versa.

There is no easy answer to the malware dilemma. Because of this, efforts must be taken at different levels. The states should continue to pass laws against computer crime. Companies need to find the balance between too many and not enough rules. They also have to continually educate their people who have their hands on a great deal of valuable information. As long as there are individuals who are willing to take unethical or illegal steps for personal gain, processes have to be in place to prevent them.

References Cited

Bowyer, K.W. (2003). “Living responsibly in a computerized world.” Ethics and Computing. New York: IEEE press.

Control Guard.

Franklin, I. (November 26, 2002) “Entercept Security Technologies: Rules or signatures?

The best method of prevention.” Toolbox. Retrieved from website September 16,


National Conference of State Legislators (July 13, 2006). “2006 State Legislation

Relating to Internet Spyware or Adware.” Website retrieved September 15, 2006.

Smith, R.E. (September 7, 2006) “Laptop Hall of Shame” Website Retrieved September 16, 2006.

Viruslist. “Malware” Website retrieved September 16, 2006.

Wikipedia. (September 16, 2006) “Malware.” Website retrieved September 17, 2006.

Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

Online Academic Help With Different Subjects


Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.


Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!


While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.


Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.


In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.


Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.


We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!


We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.


Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.


Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.


Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.


Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

All samples
Article review
Thesis/Thesis chapter
Research paper
Article review
A Holistic Response to Crime Victimization
View this sample
Thesis/Thesis chapter
Post Covid-19 Economic Recovery
View this sample
Research paper
Final Case Analysis: Organizational Ethical Dilemmas
Undergrad. (yrs 3-4)
Business Studies
View this sample
Research paper
Communicable Disease
View this sample
Research paper
Mental health
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.


Happy Clients


Words Written This Week


Ongoing Orders


Customer Satisfaction Rate

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success


We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now

error: Content is protected !!
Open chat
Need assignment help? You can contact our live agent via WhatsApp using +1 718 717 2861

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code DEADLINE