Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Security - School Essays

Computer Security

Use this

Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of

Computer system can cause as much as harm as any physical hazard.

For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the

Hackers.

The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

design a lock to lock up all our data or using identification to verify the identity of someone seeking access to our computers.

The most common method to lock up the data is using a password system. Passwords are a multi-user computer system's usual first line of defense against hackers. We can use a combination of alphabetic and number characters to form our own password. The longer the password, the more possibilities a hacker's password-guessing program must work through. However it is difficult to remember a very long passwords. So people will try to write the password down and it may immediately make it a security risk. Furthermore, a high speed password-guessing program can find out a password easily. Therefore, it is not enough for a computer that just have a password system to protect its data and memory.

Besides password system, a computer company may consider about the security of its information centre. In the past, people used locks and keys to limit access to ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

method must be used. It is using something a person has --- physical trait of a human being.

We can use a new technology called biometric device to identify the person who wants to use your computer. Biometric devices are instrument that perform mathematical analyses of biological characteristics. For example, voices, fingerprint and geometry of the hand can be used for identification. Nowadays, many computer centers, bank vaults, military installations and other sensitive areas have considered to use biometric security system. It is because the rate of mistaken acceptance of outsiders and the rejection of authorized insiders is extremely low.

Individuality of vocal signature is one ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Security. (2014, June 9). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Computer-Security/104196
"Computer Security." Essayworld.com. Essayworld.com, 9 Jun. 2014. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Computer-Security/104196>
"Computer Security." Essayworld.com. June 9, 2014. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Security/104196.
"Computer Security." Essayworld.com. June 9, 2014. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Security/104196.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 6/9/2014 07:45:48 PM
Submitted By: mrstara1
Category: Computers
Type: Premium Paper
Words: 2347
Pages: 9

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Security And The Law
» Computer Security
» Computer Security
» Computer Security
» Computer Security
» "Computer Security" By Time Lif...
» The Necessity Of Computer Secur...
» Computer Protection
» Protecting A Computer
» COMPUTER CRIME Hackers And Secu...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved