Thursday, March 21, 2019
Computer Security Essay -- Technology Papers
calculating machine SecurityIn the last few decades, the world power saw a gyration in information and technology, and the main factor of this revolution was the info processor. calculating machines do life easier for millions of people all over the world, especially in the linked States, where the latest innovations in the field of computers take place. Information circulates with utmost(a) speed, and a person with a computer and access to the Internet trick determine what is happening on Wall Street, even if he is thousands of miles forward from thither. both user of this network can buy, sell, and make money by staying in his bed. But in order to guarantee the stability of such(prenominal) a world where a lot of transactions occur, billions of dollars atomic number 18 at stake, there must be some kind of bail to find the calling of information between millions of interconnected computers. Even if computer warranter techniques are more and more effective, there ar e still threats to my aegis as a user of the Internet. It would be interesting to understand the construct of computer security and its techniques before explaining what are the threats to computer security, and finally feeling to its application program on the Internet. Computer security has been important since the creation of the Internet. Still, Steven L. Shaffer and Alan R. Simon divulge it as being one of the largest difficulties with which the computer technology industry is confronted forthwith (21). Computer Security is the generic name for the collection of tools designed to defend entropy and to thwart hackers (Stallings 1). It is important to guarantee such security to nourish data while it is transmitted. When there are many computer security work in a network, the transmission of information has to be ... .... 2001.*Macgregor, Robert S. www.Security. stop number shoot River, NJ Prentice Hall, 1996.*Protos, John. The High Cost of Cyber Crime. Business calendar week 26 Mar. 2001 52.*Shaffer, Steven L., and Alan R. Simon. Network Security. Boston, MA AP Professional, 1994.*Stallings, William. Network and Internetwork Security. Englewood Cliffs, NJ IEEE P, 1995.*Wayner, Peter. Digital Cash. Boston, MA AP Professional, 1996.*What is Hacking? Online Posting. 17 Mar. 1998. 08 Apr. 2001. Availablehttp//www.hackers.com/html/hdcfaq.html008.*Why Cryptography is Harder Than it Looks. Online Posting. 24 Mar. 2001. spreadhead Systems. 8 Apr. 2001. Available http//www.counterpane.com/whycrypto.html.*Willing, Richard, and Salina Khan. Search for Love Bug Creator Narrows distaff comic in Philippines may be Arrested Today. USA Today 8 whitethorn 2000 1B. Computer Security Essay -- Technology PapersComputer SecurityIn the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especi ally in the United States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what is happening on Wall Street, even if he is thousands of miles away from there. Any user of this network can buy, sell, and make money by staying in his bed. But in order to guarantee the stability of such a world where a lot of transactions occur, billions of dollars are at stake, there must be some kind of security to regulate the traffic of information between millions of interconnected computers. Even if computer security techniques are more and more effective, there are still threats to my security as a user of the Internet. It would be interesting to understand the concept of computer security and its techniques before explaining what are the threats to computer security, and finally looking to its application on the Internet. Computer security has been important sin ce the creation of the Internet. Still, Steven L. Shaffer and Alan R. Simon describe it as being one of the largest difficulties with which the computer technology industry is confronted today (21). Computer Security is the generic name for the collection of tools designed to protect data and to thwart hackers (Stallings 1). It is important to guarantee such security to protect data while it is transmitted. When there are many computer security services in a network, the transmission of information has to be ... .... 2001.*Macgregor, Robert S. www.Security. Upper Saddle River, NJ Prentice Hall, 1996.*Protos, John. The High Cost of Cyber Crime. Business Week 26 Mar. 2001 52.*Shaffer, Steven L., and Alan R. Simon. Network Security. Boston, MA AP Professional, 1994.*Stallings, William. Network and Internetwork Security. Englewood Cliffs, NJ IEEE P, 1995.*Wayner, Peter. Digital Cash. Boston, MA AP Professional, 1996.*What is Hacking? Online Posting. 17 Mar. 1998. 08 Apr. 2001. Availabl ehttp//www.hackers.com/html/hdcfaq.html008.*Why Cryptography is Harder Than it Looks. Online Posting. 24 Mar. 2001. Counterpane Systems. 8 Apr. 2001. Available http//www.counterpane.com/whycrypto.html.*Willing, Richard, and Salina Khan. Search for Love Bug Creator Narrows Female Suspect in Philippines may be Arrested Today. USA Today 8 May 2000 1B.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment