I need to paraphrase these but do not summaries or cut the content
I took them copy past from the internet I want to remove the plagiarism
it is 2 and half pages long
please let me know if you are willing to do it within less than 7 hours
In the United States, there were an estimated 30 million surveillance cameras in the United States in 2011. Video surveillance has been common in the United States since the 1990s; for example, one manufacturer reported net earnings of $120 million in 1995.With lower cost and easier installation, sales of home security cameras increased in the early 21st century. Following the September 11 attacks, the use of video surveillance in public places became more common to deter future terrorist attacks. Under the Homeland Security Grant Program, government grants are available for cities to install surveillance camera networks. In 2009, there were an estimated 15,000 CCTV systems in Chicago, many linked to an integrated camera network. New York City’s Domain Awareness Systemhas 6,000 video surveillance cameras linked together, there are over 4,000 cameras on the subway system (although nearly half of them do not work),and two-thirds of large apartment and commercial buildings use video surveillance cameras. In the Washington D.C.-area, there are more than 30,000 surveillance cameras in schools,and the Metro has nearly 6,000 cameras in use across the system.
1.2. Computer Security (Intrusion Detection):
Today, Computer security, IT security or cybersecurity used to protect computer systems from theft or damage to their hardware, software or information and electronic data, as well as from disruption or misdirection of the services they provide. Moreover, the field of computer security is growing due to increasing reliance on computer systems, the wireless and internet networks such as WI-FI and Bluetooth and due to the growth of smart devices, including smart phone, televisions and the various tiny devices that constitute the internet of things. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible threats and violations of computer security policies, standard security practices, or acceptable use policies.
2.1. History of Monitoring:
Barry Steinhardt of the ACLU Technology and Liberty Program said, “Keystroke monitors destroy boundaries between and employer’s facilities and the employee’s personal business” This issue about keyboard monitoring software comes from issue 5-1 on page 5.04. Keyboard or keystroke monitoring software is an application program that captures the signals that move between the keyboard and the computer and then it stores all the keystrokes in a file on the computer or it sends them to a remote user. I think that keyboard monitoring software is good and that it should be used at work or at home with the knowledge of the user. Many people say this is an invasion of privacy and they don’t think keyboard monitoring software should ever be used.
If some people say it is bad, should keyboard monitoring software ever be used? If so, when? I think that keyboard monitoring should be used both at home and at the workplace. It is good to use at home because a person could check what a child or spouse is doing. Most of the software coming out now has five monitoring tools all in one, they can simultaneously monitor
Email
Chats or chatrooms
Keystrokes
Instant messaging
Now people will say that monitoring is an invasion of privacy or that there should be trust from the spouse or child and I would agree but I also think monitoring is good if the user is told the software is installed. I also think that the keyboard monitoring software should be used in business because when you are at work you are on their time and equipment.
Some businesses like financial institutions, don’t have the option whether or not to monitor they are required to, but the company should use judgment and talk to the user if any incidents occur and not just accuse them outright. This software should be used right now because it will help protect both family and business. Of course, it is up to them to decide if they want to use the software or not but I think it is beneficial.
Some of the makers of the software recommend the computer user be informed about the installed software. Is this good? I think if the home user is told that the program has been put on the computer then there is less of a chance for problems to arise later on. I also think that the business user should be informed that the software is on the computer. That way they know anything they write on that computer that is questionable the company will see it and so they don’t waste the companies time and money. It is a good thing that the people who make the software even recommend the user be informed it shows thinking on their part that some serious problems could come up if a user does not know that what they type on the computer is being recorded.
In the mid 1970s, the Soviet Union developed and deployed a hardware keylogger targeting typewriters. Termed the “selectric bug”, it measured the movements of the print head of IBM Selectric typewriters via subtle influences on the regional magnetic field caused by the rotation and movements of the print head. An early keylogger was written by Perry Kivolowitz and posted to the Usenet news group net.unix-wizards,net.sources on November 17, 1983.
What Students Are Saying About Us
.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"
.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."