Computer Security by Time Life Books

Only available on StudyMode
  • Download(s) : 123
  • Published : October 8, 1999
Open Document
Text Preview
"Computer Security" by Time Life Books

The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer.

Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer is like a mechanical human brain and if one has a real human brain they can operate it. In other words if one knows how a computer works they can make it work. If they do not then they cannot do anything at all. This is what computer security is meant to do. It is done by making it only possible for someone to access a computer by using a password or by locking it up.

Computer security works by many ways of password use or by locking it up. The password method is enforced by prompting a computer user to enter a password before they can access any programs or information already contained within the computer. Another password security method would be to have the computer user carry a digital screen that fits in your pocket. This digital screen receives an encrypted message and displays numbers that change every few minutes. These numbers make the password one needs for the next few minutes in order to access the computer. This password method is somewhat new. It is also better, for the previous password method is not totally fool proof. This is because the passwords are stored in the computer and if a computer literate person was to access this information, they could get into a computer and enter it looking as if they were someone else for they have obtained someone else's password. In the future when technology increasingly gets better there are possibilities that a computer could use you hand, inner eye, or voice print. Currently these methods are not used but they are right around the...
tracking img