Friday, May 31, 2019
Computer Security Essay -- Technology Papers
Computer SecurityIn the last few decades, the ground precept a revolution in information and technology, and the main factor of this revolution was the calculating machine. Computers made life easier for millions of people all over the world, especially in the join States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can draw what is fortuity on Wall Street, even if he is thousands of miles away from there. Any user of this network can buy, sell, and make money by staying in his bed. besides in order to guarantee the stability of such a world where a lot of transactions occur, billions of dollars ar at stake, there must be some kind of security to regulate the traffic of information between millions of interconnected computers. Even if computer security techniques are more and more effective, there are still threats to my security as a user of the Interne t. It would be interesting to understand the concept of computer security and its techniques before explaining what are the threats to computer security, and eventually looking to its application on the Internet. Computer security has been important since the creation of the Internet. Still, Steven L. Shaffer and Alan R. Simon describe it as being one of the largest difficulties with which the computer technology manufacture is confronted instantly (21). Computer Security is the generic name for the collection of tools designed to nourish information and to thwart hackers (Stallings 1). It is important to guarantee such security to protect data while it is transmitted. When there are many computer security services in a network, the transmission of information has to be ... .... 2001.*Macgregor, Robert S. www.Security. Upper file River, NJ Prentice Hall, 1996.*Protos, John. The High Cost of Cyber Crime. Business Week 26 Mar. 2001 52.*Shaffer, Steven L., and Alan R. Simo n. Network Security. Boston, MA AP Professional, 1994.*Stallings, William. Network and Internetwork Security. Englewood Cliffs, NJ IEEE P, 1995.*Wayner, Peter. Digital Cash. Boston, MA AP Professional, 1996.*What is Hacking? Online Posting. 17 Mar. 1998. 08 Apr. 2001. getablehttp//www.hackers.com/hypertext markup language/hdcfaq.html008.*Why Cryptography is Harder Than it Looks. Online Posting. 24 Mar. 2001. Counterpane Systems. 8 Apr. 2001. Available http//www.counterpane.com/whycrypto.html.*Willing, Richard, and Salina Khan. Search for Love Bug Creator Narrows Female Suspect in Philippines whitethorn be Arrested Today. USA Today 8 May 2000 1B. Computer Security Essay -- Technology PapersComputer SecurityIn the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especially in the United States, where the latest innov ations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what is happening on Wall Street, even if he is thousands of miles away from there. Any user of this network can buy, sell, and make money by staying in his bed. But in order to guarantee the stability of such a world where a lot of transactions occur, billions of dollars are at stake, there must be some kind of security to regulate the traffic of information between millions of interconnected computers. Even if computer security techniques are more and more effective, there are still threats to my security as a user of the Internet. It would be interesting to understand the concept of computer security and its techniques before explaining what are the threats to computer security, and finally looking to its application on the Internet. Computer security has been important since the creation of the Internet. Still, Steven L. Shaffer and Alan R. Simon describe it as being one of the largest difficulties with which the computer technology industry is confronted today (21). Computer Security is the generic name for the collection of tools designed to protect data and to thwart hackers (Stallings 1). It is important to guarantee such security to protect data while it is transmitted. When there are many computer security services in a network, the transmission of information has to be ... .... 2001.*Macgregor, Robert S. www.Security. Upper Saddle River, NJ Prentice Hall, 1996.*Protos, John. The High Cost of Cyber Crime. Business Week 26 Mar. 2001 52.*Shaffer, Steven L., and Alan R. Simon. Network Security. Boston, MA AP Professional, 1994.*Stallings, William. Network and Internetwork Security. Englewood Cliffs, NJ IEEE P, 1995.*Wayner, Peter. Digital Cash. Boston, MA AP Professional, 1996.*What is Hacking? Online Posting. 17 Mar. 1998. 08 Apr. 2001. Availablehttp//www.hackers.com/html/hdcfaq.html008.*Why C ryptography is Harder Than it Looks. Online Posting. 24 Mar. 2001. Counterpane Systems. 8 Apr. 2001. Available http//www.counterpane.com/whycrypto.html.*Willing, Richard, and Salina Khan. Search for Love Bug Creator Narrows Female Suspect in Philippines may be Arrested Today. USA Today 8 May 2000 1B.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.