Preview

Computer Security by Time Life Books

Satisfactory Essays
Open Document
Open Document
536 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security by Time Life Books
"Computer Security" by Time Life Books

The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer. Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer is like a mechanical human brain and if one has a real human brain they can operate it. In other words if one knows how a computer works they can make it work. If they do not then they cannot do anything at all. This is what computer security is meant to do. It is done by making it only possible for someone to access a computer by using a password or by locking it up.

Computer security works by many ways of password use or by locking it up.
The password method is enforced by prompting a computer user to enter a password before they can access any programs or information already contained within the computer. Another password security method would be to have the computer user carry a digital screen that fits in your pocket. This digital screen receives an encrypted message and displays numbers that change every few minutes. These numbers make the password one needs for the next few minutes in order to access the computer. This password method is somewhat new. It is also better, for the previous password method is not totally fool proof. This is because the passwords are stored in the computer and if a computer literate person was to access this information, they could get into a computer and enter it looking as if they were someone else for they have obtained someone else's password. In the future when technology increasingly gets better there are possibilities that a computer could use you hand, inner eye, or voice print. Currently these methods are not used but they are right around the corner.

You May Also Find These Documents Helpful

  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Create a new domain wide GPO and enable "Deny logon locally" user right to the source domain user accounts and disable multiple logon. Teach strong password use and force change through Password GPO.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    remote access and data trolling capabilities alone will cause the attacker to access any and all desired…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    different types of computers whether its locking your car or relieving an exhausted pilot a…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    There are many objectives to the computer security that protects the information from any theft and natural disaster which allows information into the computer network. The computer technologies have become unwanted computer behavior and security strategies behavior. The computer technology which has security went it comes to logic. The security primary goals are the computer designing, applications programs with the type of security which most have restrictions to different types of program behaviors. The computer software has to be trusted and be able to security the software and be trustworthy for the database to run.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    Break down admin responsabilities and only give them the access for what duties they need to perform. PAM command is a great idea in this scenereo.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The first chapter of Stefan Zweig describes what he calls the “Golden Age of Security”. In this passage, he discusses his childhood during the First World War. He describes his experience as the “Golden Age of Security”. He describes his Austrian Monarchy and the lifestyles of the citizens. For example, every family had to calculate their budgets as stated by Stefan Zweig, “Every Family had its own budget and knew how much could be spent” (Zweig 23). The “Golden Age of Security” refers to the era where everything was normal and everyone had a balanced life and how life was good for everyone. As shown in the text, family owned houses that were passed g the generation, relatives deposited money for babies for their future. This is the ideal…

    • 318 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To maintain logical security, access is only permitted by the use of a valid and unique identity (ID) and password combination.…

    • 1656 Words
    • 7 Pages
    Good Essays
  • Good Essays

    HE quest for a reliable and convenient security mechanism to authenticate a computer user has existed since the inadequacy of conventional password mechanism was realized, first by…

    • 12716 Words
    • 51 Pages
    Good Essays
  • Good Essays

    Can Computers Replace Men

    • 1274 Words
    • 6 Pages

    Furthermore, though computer can act like human, it is still a computer; it doesn’t have feelings or free will. We have feelings, we will be happy or unhappy, we will be ashamed when we do something wrong. We have soul and we are alive. We have free will to decide…

    • 1274 Words
    • 6 Pages
    Good Essays
  • Better Essays

    IS Project

    • 4261 Words
    • 18 Pages

    A computer is there to make your life easier composing of several pieces of equipment. The latter is composed of a multitude of things, each of which needs the proper care so that they will endure. There are many things one can do to get to one’s goal.…

    • 4261 Words
    • 18 Pages
    Better Essays
  • Satisfactory Essays

    Blue Brain

    • 510 Words
    • 3 Pages

    A machine that functions as our Brain  We can just call it as Artificial Brain  Possible by using Super Computers…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Computers

    • 511 Words
    • 3 Pages

    Ever since the computers were invented, people’s lives have changed a lot, which brought many benefits and conveniences to these people. In current society, there is at least one computer being held in every household, which means that people use the computer every day and it has become a useful resource in their lives.…

    • 511 Words
    • 3 Pages
    Good Essays