Preview

Computer Security by Time Life Books

Satisfactory Essays
Open Document
Open Document
536 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security by Time Life Books
"Computer Security" by Time Life Books

The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer. Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer is like a mechanical human brain and if one has a real human brain they can operate it. In other words if one knows how a computer works they can make it work. If they do not then they cannot do anything at all. This is what computer security is meant to do. It is done by making it only possible for someone to access a computer by using a password or by locking it up.

Computer security works by many ways of password use or by locking it up.
The password method is enforced by prompting a computer user to enter a password before they can access any programs or information already contained within the computer. Another password security method would be to have the computer user carry a digital screen that fits in your pocket. This digital screen receives an encrypted message and displays numbers that change every few minutes. These numbers make the password one needs for the next few minutes in order to access the computer. This password method is somewhat new. It is also better, for the previous password method is not totally fool proof. This is because the passwords are stored in the computer and if a computer literate person was to access this information, they could get into a computer and enter it looking as if they were someone else for they have obtained someone else's password. In the future when technology increasingly gets better there are possibilities that a computer could use you hand, inner eye, or voice print. Currently these methods are not used but they are right around the corner.

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    remote access and data trolling capabilities alone will cause the attacker to access any and all desired…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many objectives to the computer security that protects the information from any theft and natural disaster which allows information into the computer network. The computer technologies have become unwanted computer behavior and security strategies behavior. The computer technology which has security went it comes to logic. The security primary goals are the computer designing, applications programs with the type of security which most have restrictions to different types of program behaviors. The computer software has to be trusted and be able to security the software and be trustworthy for the database to run.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    7. What is the PASS_MIN_DAYS setting? Min days until you have to change the password…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Software Liablilty

    • 1744 Words
    • 7 Pages

    Computer software, be it the brain behind our VCR or the program created specifically to run a country's missile defense system, are an absolutely integral part of helping to make our day-to-day lives that much less complicated. But when your blender comes screaming to life in your sleep, or your bank somehow “loses” your life savings and says “you only have 37 cents in that account”, who is to blame? According to liability laws that have been in question since the birth of what might be considered the “modern age of technology”, that's still up in the air. Certainly systems exist to try and protect the average consumer or even a business, but the problem arises when you try to apply your 200 year old laws to the murky realm of computers…

    • 1744 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The first chapter of Stefan Zweig describes what he calls the “Golden Age of Security”. In this passage, he discusses his childhood during the First World War. He describes his experience as the “Golden Age of Security”. He describes his Austrian Monarchy and the lifestyles of the citizens. For example, every family had to calculate their budgets as stated by Stefan Zweig, “Every Family had its own budget and knew how much could be spent” (Zweig 23). The “Golden Age of Security” refers to the era where everything was normal and everyone had a balanced life and how life was good for everyone. As shown in the text, family owned houses that were passed g the generation, relatives deposited money for babies for their future. This is the ideal…

    • 318 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To maintain logical security, access is only permitted by the use of a valid and unique identity (ID) and password combination.…

    • 1656 Words
    • 7 Pages
    Good Essays
  • Best Essays

    based system has been proposed here to authenticate users for imposing access restriction to web. This method has been tested on 100…

    • 3825 Words
    • 16 Pages
    Best Essays
  • Good Essays

    HE quest for a reliable and convenient security mechanism to authenticate a computer user has existed since the inadequacy of conventional password mechanism was realized, first by…

    • 12716 Words
    • 51 Pages
    Good Essays
  • Good Essays

    Can Computers Replace Men

    • 1274 Words
    • 6 Pages

    Furthermore, though computer can act like human, it is still a computer; it doesn’t have feelings or free will. We have feelings, we will be happy or unhappy, we will be ashamed when we do something wrong. We have soul and we are alive. We have free will to decide…

    • 1274 Words
    • 6 Pages
    Good Essays
  • Better Essays

    IS Project

    • 4261 Words
    • 18 Pages

    A computer is there to make your life easier composing of several pieces of equipment. The latter is composed of a multitude of things, each of which needs the proper care so that they will endure. There are many things one can do to get to one’s goal.…

    • 4261 Words
    • 18 Pages
    Better Essays
  • Powerful Essays

    * The system will also have a security password for the security of the data’s being entered.…

    • 1363 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Blue Brain

    • 510 Words
    • 3 Pages

    A machine that functions as our Brain  We can just call it as Artificial Brain  Possible by using Super Computers…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Computers

    • 511 Words
    • 3 Pages

    Ever since the computers were invented, people’s lives have changed a lot, which brought many benefits and conveniences to these people. In current society, there is at least one computer being held in every household, which means that people use the computer every day and it has become a useful resource in their lives.…

    • 511 Words
    • 3 Pages
    Good Essays