AskEssays.com - Discover essay samples

Security 2

4.9 of 5.0 (69 reviews)

Contains
1556 words
Category
Other

Security 2 Page 1
Security 2 Page 2
Security 2 Page 3
Security 2 Page 4
Security 2 Page 5
Security 2 Page 6
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Security 2


Computer Security



About two hundred years before, the word "computer" started

to appear in the dictionary. Some people even didn't know what is

a computer. However, most of the people today not just knowing

what is a computer, but understand how to use a computer.

Therefore, computer become more and more popular and

important to our society. We can use computer everywhere and

they are very useful and helpful to our life. The speed and

accuracy of computer made people felt confident and reliable.

Therefore, many important information or data are saved in the

computer. Such as your diary, the financial situation of a oil

company or some secret intelligence of the military department. A

lot of important information can be found in the memory of

computer. So, people may ask a question: Can we make sure that

the information in the computer is safe and nobody can steal it

from the memory of the computer?

Physical hazard is one of the causes of destroying the data

in the computer. For example, send a flood of coffee toward a

personal computer. The hard disk of the computer could be

endangered by the flood of coffee. Besides, human caretaker of

computer system can cause as much as harm as any physical hazard.

For example, a cashier in a bank can transfer some money from one

of his customer's account to his own account. Nonetheless, the

most dangerous thief are not those who work with computer every

day, but youthful amateurs who experiment at night --- the

hackers.

The term "hacker "may have originated at M.I.T. as students'

jargon for classmates who labored nights in the computer lab. In

the beginning, hackers are not so dangerous at all. They just

stole computer time from the university. However, in the early

1980s, hackers became a group of criminals who steal information

from other peoples' computer.

For preventing the hackers and other criminals, people need

to set up a good security system to protect the data in the

computer. The most important thing is that we cannot allow those

hackers and criminals entering our computers. It means that we

need to design a lock to lock up all our data or using

identification to verify the identity of someone seeking access

to our computers.

The most common method to lock up the data is using a

password system. Passwords are a multi-user computer system's

usual first line of defense against hackers. We can use a

combination of alphabetic and number characters to form our own

password. The longer the password, the more possibilities a

hacker's password-guessing program must work through. However it

is difficult to remember a very long passwords. So people will

try to write the password down and it may immediately make it a

security risk. Furthermore, a high speed password-guessing

program can find out a password easily. Therefore, it is not

enough for a computer that just have a password system to protect

its data and memory.

Besides password system, a computer company may consider

about the security of its information centre. In the past, people

used locks and keys to limit access to secure areas. However,

keys can be stolen or copied easily. Therefore, card-key are

designed to prevent the situation above. Three types of card-keys

are commonly used by banks, computer centers and government

departments. Each of this card-keys can employ an identifying

number or password that is encoded in the card itself, and all

are produced by techniques beyond the reach of the average

computer criminals. One of the three card-key is called watermark

magnetic. It was inspired by the watermarks on paper currency.

The card's magnetic strip have a 12-digit number code and it

cannot be copied. It can store about two thousand bits in the

magnetic strip. The other two cards have the capability of

storing thousands of times of data in the magnetic strip. They

are optical memory cards (OMCs) and Smart cards. Both of them are

always used in the security system of computers.

However, it is not enough for just using password system and

card-keys to protect the memory in the computer. A computer

system also need to have a restricting program to verify the

identity of the users. Generally, identity can be established by

something a person knows, such as a password or something a

person has, such as a card-key. However, people are often forget

their passwords or lose their keys. A third method must be used.

It is using something a person has --- physical trait of a human

being.

We can use a new technology called biometric device to

identify the person who wants to use your computer. Biometric

devices are instrument that perform mathematical analyses of

biological characteristics. For example, voices, fingerprint and

geometry of the hand can be used for identification. Nowadays,

many computer centers, bank vaults, military installations and

other sensitive areas have considered to use biometric security

system. It is because the rate of mistaken acceptance of

outsiders and the rejection of authorized insiders is extremely

low.

Individuality of vocal signature is one kind of biometric

security system. The main point of this system is voice

verification. The voice verifier described here is a

developmental system at American Telephone and Telegraph. Only

one thing that people need to do is repeating a particular phrase

several times. The computer would sample, digitize and store what

you said. After that, it will built up a voice signature and make

allowances for an individual's characteristic variations. The

theory of voice verification is very simple. It is using the

characteristics of a voice: its acoustic strength. To isolate

personal characteristics within these fluctuations, the computer

breaks the sound into its component frequencies and analyzes how

they are distributed. If someone wants to steal some information

from your computer, the person needs to have a same voice as you

and it is impossible.

Besides using voices for identification, we can use

fingerprint to verify a person's identity because no two

fingerprints are exactly alike. In a fingerprint verification

system, the user places one finger on a glass plate; light

flashes inside the machine, reflects off the fingerprint and is

picked up by an optical scanner. The scanner transmits the

information to the computer for analysis. After that, security

experts can verify the identity of that person by those

information.

Finally, the last biometric security system is the geometry

of the hand. In that system, the computer system uses a

sophisticated scanning device to record the measurements of each

person's hand. With an overhead light shining down on the hand, a

sensor underneath the plate scans the fingers through the glass

slots, recording light intensity from the fingertips to the

webbing where the fingers join the palm. After passing the

investigation of the computer, people can use the computer or

retrieve data from the computer.

Although a lot of security system have invented in our

world, they are useless if people always think that stealing

information is not a serious crime. Therefore, people need to pay

more attention on computer crime and fight against those hackers,

instead of using a lot of computer security systems to protect

the computer.

Why do we need to protect our computers ?

It is a question which people always ask in 18th century.

However, every person knows the importance and useful of a

computer security system.

In 19th century, computer become more and more important and

helpful. You can input a large amount of information or data in a

small memory chip of a personal computer. The hard disk of a

computer system is liked a bank. It contained a lot of costly

material. Such as ...

You are currently seeing 50% of this paper.

You're seeing 1556 words of 3111.

Keywords: security 2017, security 2021, security 2000, security 20.03.25, security 2.0, security 2017 trailer, security 2023, security 247

Similar essays


Paintball

is a fast and furious sport. It is played on both a social and serious level by over 16 million people around the world (Cooke,11). It is one of the fastest growing sports on the planet. 's history, games, guns, and safety are all part of the fun. In 1970, James Hale, an engineer, invented and patented the first commercially successful gun. g...

101 reviews
Download
Defending Pro-Wrestling

As people flip through the channels on Monday nights they pass over at least two different professional wrestling shows. When people notice the wrestling the most common thing for them to do is to keep flipping the channels. Why? Because the common view of professional wrestling is that it is not real and it is stupid. Two years ago I thought t...

57 reviews
Download
Work and labour

have been around forever, although it did not always work to the standards that we are used to today. Over the years, many hard working and deprived people had to fight for the rights that are taken for granted today. Are safety and health involved with work? Is work dangerous for your health? I will try to answer these questions by summar...

42 reviews
Download
Marketing of Honda motorcycles

in the USA The American Honda Motor Company was established as a subsidiary by Honda in 1959. During the 1960's the type of motorcycles brought by Americans underwent a major change. Motorcycle registrations increased by over 800,000 in five years from 1960. In the early 60's the major competitors were Haley - Davidson of U...

52 reviews
Download
Fleurs tracks

Fleur?s Tracks In Louise Erdrich?s ?Tracks?, the readers discovers by the second chapter that there are two narrators, Nanapush and Pauline Puyat. This method of having two narrators telling their stories alternately could be at first confusing, especially if the readers hasn?t been briefed about it or hasn?t read a synopsis of it. Trad...

78 reviews
Download
Anorexia Nervosa includes bi

Anorexia Nervosa - includes bi Anorexia Nervosa In America, girls are given the message at a very young age that in order to be happy and successful, they must be thin. Given the value which society places on being thin, it is not surprising that eating disorders are on the increase. Every time you walk into a store, you are surrounded by...

55 reviews
Download
Children And Play In The First

In the first two years of life play is both a reflection of and an influence on all areas of infant development: intellectual, social, emotional and physical. Play is a central, all'encompassing characteristic of infant development, allowing children to learn about the world and themselves. Even during the first half-year of life infant's really...

11 reviews
Download
A review of the article infide

Through research psychologists and other researchers have claimed that sexual infidelity effects both men and women differently. In addition, their beliefs on sexual infidelity differ. There have been many theories about the occurrence of infidelity, and most researchers have different opinions about these theories. Researchers from the artic...

45 reviews
Download
Fighting for an Innocent Death

The four police officers acquitted of killing Amadou Diallo on the streets of the Bronx in New York should have been found guilty of second-degree murder. Edward McMellon, Sean Carroll, Kenneth Boss, and Richard Murphy are each part of the elite Street Crime Unit of the New York City Police Department. McMellon, Boss, and Carroll each...

10 reviews
Download
What makes a good doctor

What defines a good doctor? On the basis of sources such as the British Medical Council and interviews with patients it is possible to divide the qualities needed to be a good doctor in to two categories. The first of these categories involves qualities associated with creating a good doctor-patient relationship. The attributes requir...

89 reviews
Download
Abusing AA

Using AA vs. This paper will try to explain the different views of how and why Alcoholics Anonymous and other 12-step programs are accepted and rejected as effective tools in treating alcoholism and other addictions. The articles reviewed contradict the others' opinion. First, we see that supporting the 12-step programs with a degree of inv...

61 reviews
Download
Land of canada

Landscape and Memory The purity of our cities; the sanitary; the unpolluted air and environment. These are some of the things we take for granted. Things people around the world, in different countries would love to see and feel. Our air is fresh, clean and odorless, not humid like some of the warmer regions around the world. Brazil, South...

91 reviews
Download
Infanticide

Killing your baby. What could be more depraved? Every year hundreds of women and men commit -they kill their newborns or let them die. Most s remain undiscovered but every now and then a janitor follows a trail of blood to a tiny body in a trash bin. (Pinker, New York Times) , the deliberate killing of infants, was once an economic necessity an...

3 reviews
Download
Aristotle On Virtue

Ing. Ivan Kopriva, Managing Director of the SESAM Formula Table of Contents Introduction. p. 3 The Czech economy p. 3 Euronova p. 4 Brief profile of Euronova''s retail store chains p. 5 The Marketing Concept p. 6 Conclusion p. 8 Appendix I: Division of FDI in the Czech Republic p. 10 References p. 11 Introduction Royal Ahold N.V. is one...

80 reviews
Download
Atsisiųsti šį darbą