Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Security 2 - Papers Online

Security 2


About two hundred years before, the word "computer" started
to appear in the dictionary. Some people even didn't know what is
a computer. However, most of the people today not just knowing
what is a computer, but understand how to use a computer.
Therefore, computer become more and more popular and
important to our society. We can use computer everywhere and
they are very useful and helpful to our life. The speed and
accuracy of computer made people felt confident and reliable.
Therefore, many important information or data are saved in the
computer. Such as your diary, the financial situation of a oil
company or some secret intelligence of the military department. ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

system can cause as much as harm as any physical hazard.
For example, a cashier in a bank can transfer some money from one
of his customer's account to his own account. Nonetheless, the
most dangerous thief are not those who work with computer every
day, but youthful amateurs who experiment at night --- the
hackers.
The term "hacker "may have originated at M.I.T. as students'
jargon for classmates who labored nights in the computer lab. In
the beginning, hackers are not so dangerous at all. They just
stole computer time from the university. However, in the early
1980s, hackers became a group of criminals who steal information
from other peoples' computer.
For preventing the hackers and other criminals, people need
to set up a good security system to protect the data in the
computer. The most important thing is that we cannot allow those
hackers and criminals entering our computers. It means that we
need to design a ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

can employ an identifying
number or password that is encoded in the card itself, and all
are produced by techniques beyond the reach of the average
computer criminals. One of the three card-key is called watermark
magnetic. It was inspired by the watermarks on paper currency.
The card's magnetic strip have a 12-digit number code and it
cannot be copied. It can store about two thousand bits in the
magnetic strip. The other two cards have the capability of
storing thousands of times of data in the magnetic strip. They
are optical memory cards (OMCs) and Smart cards. Both of them are
always used in the security system of computers.
However, it is not ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Security 2. (2008, August 4). Retrieved March 29, 2024, from http://www.essayworld.com/essays/Security-2/87831
"Security 2." Essayworld.com. Essayworld.com, 4 Aug. 2008. Web. 29 Mar. 2024. <http://www.essayworld.com/essays/Security-2/87831>
"Security 2." Essayworld.com. August 4, 2008. Accessed March 29, 2024. http://www.essayworld.com/essays/Security-2/87831.
"Security 2." Essayworld.com. August 4, 2008. Accessed March 29, 2024. http://www.essayworld.com/essays/Security-2/87831.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/4/2008 10:24:41 PM
Category: Miscellaneous
Type: Premium Paper
Words: 2495
Pages: 10

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Network Security And Firewalls
» Internet Security 2
» Security, Commerce And The Int
» Network Security
» Social Security In The Future? ...
» Computer Security And The Law
» Internet Security
» Turkey Strategic Security And I...
» Computer Security
» COMPUTER CRIME Hackers And Secu...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved