+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Computer protection

Essay, term paper, research paper:  Information Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: Computer Protection, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Computer Protection


About two hundred years before, the word "computer" started to appear in
the dictionary. Some people even didn't know what is a computer. However, most
of the people today not just knowing what is a computer, but understand how to
use a computer.
Therefore, computer become more and more popular and important to our
society. We can use computer everywhere and they are very useful and helpful to
our life. The speed and accuracy of computer made people felt confident and
reliable. Therefore, many important information or data are saved in the
computer. Such as your diary, the financial situation of a oil company or some
secret intelligence of the military department. A lot of important information
can be found in the memory of computer. So, people may ask a question: Can we
make sure that the information in the computer is safe and nobody can steal it
from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the
computer. For example, send a flood of coffee toward a personal computer. The
hard disk of the computer could be endangered by the flood of coffee. Besides,
human caretaker of computer system can cause as much as harm as any physical
hazard. For example, a cashier in a bank can transfer some money from one of his
customer's account to his own account. Nonetheless, the most dangerous thief are
not those who work with computer every day, but youthful amateurs who experiment
at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for
classmates who labored nights in the computer lab. In the beginning, hackers are
not so dangerous at all. They just stole computer time from the university.
However, in the early 1980s, hackers became a group of criminals who steal
information from other peoples' computer.
For preventing the hackers and other criminals, people need to set up a
good security system to protect the data in the computer. The most important
thing is that we cannot allow those hackers and criminals entering our computers.
It means that we need to design a lock to lock up all our data or using
identification to verify the identity of someone seeking access to our computers.

The most common method to lock up the data is using a password system.
Passwords are a multi-user computer system's usual first line of defense against
hackers. We can use a combination of alphabetic and number characters to form
our own password. The longer the password, the more possibilities a hacker's
password-guessing program must work through. However it is difficult to remember
a very long passwords. So people will try to write the password down and it may
immediately make it a security risk. Furthermore, a high speed password-guessing
program can find out a password easily. Therefore, it is not enough for a
computer that just have a password system to protect its data and memory.
Besides password system, a computer company may consider about the
security of its information centre. In the past, people used locks and keys to
limit access to secure areas. However, keys can be stolen or copied easily.
Therefore, card-key are designed to prevent the situation above. Three types of
card-keys are commonly used by banks, computer centers and government
departments. Each of this card-keys can employ an identifying number or password
that is encoded in the card itself, and all are produced by techniques beyond
the reach of the average computer criminals. One of the three card-key is called
watermark magnetic. It was inspired by the watermarks on paper currency. The
card's magnetic strip have a 12-digit number code and it cannot be copied. It
can store about two thousand bits in the magnetic strip. The other two cards
have the capability of storing thousands of times of data in the magnetic strip.
They are optical memory cards (OMCs) and Smart cards. Both of them are always
used in the security system of computers.
However, it is not enough for just using password system and card-keys
to protect the memory in the computer. A computer system also need to have a
restricting program to verify the identity of the users. Generally, identity can
be established by something a person knows, such as a password or something a
person has, such as a card-key. However, people are often forget their passwords
or lose their keys. A third method must be used. It is using something a person
has --- physical trait of a human being.
We can use a new technology called biometric device to identify the
person who wants to use your computer. Biometric devices are instrument that
perform mathematical analyses of biological characteristics. For example, voices,
fingerprint and geometry of the hand can be used for identification. Nowadays,
many computer centers, bank vaults, military installations and other sensitive
areas have considered to use biometric security system. It is because the rate
of mistaken acceptance of outsiders and the rejection of authorized insiders is
extremely low.
Individuality of vocal signature is one kind of biometric security
system. The main point of this system is voice verification. The voice verifier
described here is a developmental system at American Telephone and Telegraph.
Only one thing that people need to do is repeating a particular phrase several
times. The computer would sample, digitize and store what you said. After that,
it will built up a voice signature and make allowances for an individual's
characteristic variations. The theory of voice verification is very simple. It
is using the characteristics of a voice: its acoustic strength. To isolate
personal characteristics within these fluctuations, the computer breaks the
sound into its component frequencies and analyzes how they are distributed. If
someone wants to steal some information from your computer, the person needs to
have a same voice as you and it is impossible.
Besides using voices for identification, we can use fingerprint to
verify a person's identity because no two fingerprints are exactly alike. In a
fingerprint verification system, the user places one finger on a glass plate;
light flashes inside the machine, reflects off the fingerprint and is picked up
by an optical scanner. The scanner transmits the information to the computer for
analysis. After that, security experts can verify the identity of that person by
those information.
Finally, the last biometric security system is the geometry of the hand.
In that system, the computer system uses a sophisticated scanning device to
record the measurements of each person's hand. With an overhead light shining
down on the hand, a sensor underneath the plate scans the fingers through the
glass slots, recording light intensity from the fingertips to the webbing where
the fingers join the palm. After passing the investigation of the computer,
people can use the computer or retrieve data from the computer.
Although a lot of security system have invented in our world, they are
useless if people always think that stealing information is not a serious crime.
Therefore, people need to pay more attention on computer crime and fight against
those hackers, instead of using a lot of computer security systems to protect
the computer.
Why do we need to protect our computers ?
It is a question which people always ask in 18th century. However, every
person knows the importance and useful of a computer security system.
In 19th century, computer become more and more important and helpful. You
can input a large amount of information or data in a small memory chip of a
personal computer. The hard disk of a computer system is liked a bank. It
contained a lot of costly material. Such as your diary, the financial situation
of a trading company or some secret military information. Therefore, it just
like hire some security guards to protect the bank. A computer security system
can use to prevent the outflow of the information in the national defense
industry or the personal diary in your computer.
Nevertheless, there is the price that one might expect to pay for the
tool of security: equipment ranging from locks on doors to computerized gate-
keepers that stand watch against hackers, special software that prevents
employees to steal the data from the company's computer. The bill can range from
hundreds of dollars to many millions, depending on the degree of assurance
sought.
Although it needs to spend a lot of money to create a computer security
system, it worth to make it. It is because the data in a computer can be easily
erased or destroyed by a lot of kind of hazards. For example, a power supply
problem or a fire accident can destroy all the data in a computer company. In
1987, a computer centre inside the Pentagon, the US military's sprawling head
quarters near Washington, DC., a 300-Watt light bulb once was left burning
inside a vault where computer tapes were stored. After a time, the bulb had
generated so much heat that the ceiling began to smelt. When the door was opened,
air rushing into the room brought the fire to life. Before the flames could be
extinguished, they had spread consume three computer systems worth a total of
$6.3 million.
Besides those accidental hazards, human is a great cause of the outflows
of data from the computer. There have two kind of people can go in the security
system and steal the data from it. One is those trusted employee who is designed
to let in the computer system, such as programmers, operators or managers.
Another kind is those youth amateurs who experiment at night ----the hackers.
Let's talk about those trusted workers. They are the groups who can
easily become a criminal directly or indirectly. They may steal the information
in the system and sell it to someone else for a great profit. In another hand,
they may be bribed by someone who want to steal the data. It is because it may
cost a criminal far less in time and money to bride a disloyal employee to crack
the security system.
Beside those disloyal workers, hacker is also very dangerous. The term
"hacker" is originated at M.I.T. as students' jargon for classmates who doing
computer lab in the night. In the beginning, hackers are not so dangerous at all.
They just stole some hints for the test in the university. However, in early
1980s, hacker became a group of criminal who steal information from other
commercial companies or government departments.
What can we use to protect the computer ?
We have talked about the reasons of the use of computer security system.
But what kind of tools can we use to protect the computer. The most common one
is a password system. Password are a multi-user computer system's which usual
used for the first line of defense against intrusion. A password may be any
combination of alphabetic and numeric characters, to maximum lengths set by the
e particular system. Most system can accommodate passwords up to 40 characters.
However, a long passwords can be easily forget. So, people may write it down and
it immediately make a security risk. Some people may use their first name or a
significant word. With a dictionary of 2000 common names, for instance, a
experienced hacker can crack it within ten minutes.
Besides the password system, card-keys are also commonly used. Each
kind of card-keys can employ an identifying number or password that is encoded
in the card itself, and all are produced by techniques beyond the reach of the
average computer criminal. Three types of card usually used. They are magnetic
watermark, Optical memory card and Smart card.
However, both of the tools can be easily knew or stole by other people.
Password are often forgotten by the users and card-key can be copied or stolen.
Therefore, we need to have a higher level of computer security system. Biometric
device is the one which have a safer protection for the computer. It can reduce
the probability of the mistaken acceptance of outsider to extremely low.
Biometric devices are instrument that perform mathematical analyses of
biological characteristics. However, the time required to pass the system should
not be too long. Also, it should not give inconvenience to the user. For example,
the system require people to remove their shoes and socks for footprint
verification.
Individuality of vocal signature is one kind of biometry security system.
They are still in the experimental stage, reliable computer systems for voice
verification would be useful for both on-site and remote user identification.
The voice verifier described here is invented by the developmental system at
American Telephone and Telegraph. Enrollment would require the user to repeat a
particular phrase several times. The computer would sample, digitize and store
each reading of the phrase and then, from the data, build a voice signature that
would make allowances for an individual's characteristic variations.
Another biometric device is a device which can measuring the act of
writing. The device included a biometric pen and a sensor pad. The pen can
converts a signature into a set of three electrical signals by one pressure
sensor and two acceleration sensors. The pressure sensor can change in the
writer's downward pressure on the pen point. The two acceleration sensor can
measure the vertical and horizontal movement.
The third device which we want to talk about is a device which can scan
the pattern in the eyes. This device is using an infrared beam which can scan
the retina in a circular path. The detector in the eyepiece of the device can
measure the intensity of the light as it is reflected from different points.
Because blood vessels do not absorb and reflect the same quantities of infrared
as the surrounding tissue, the eyepiece sensor records the vessels as an
intricate dark pattern against a lighter background. The device samples light
intensity at 320 points around the path of the scan , producing a digital
profile of the vessel pattern. The enrollment can take as little as 30 seconds
and verification can be even faster. Therefore, user can pass the system quickly
and the system can reject those hackers accurately.
The last device that we want to discuss is a device which can map the
intricacies of a fingerprint. In the verification system, the user places one
finger on a glass plate; light flashes inside the machine ,reflect off the
fingerprint and is picked up by an optical scanner. The scanner transmits the
information to the computer for analysis.
Although scientist have invented many kind of computer security systems,
no combination of technologies promises unbreakable security. Experts in the
field agree that someone with sufficient resources can crack almost any computer
defense. Therefore, the most important thing is the conduct of the people. If
everyone in this world have a good conduct and behavior, there is no need to use
any complicated security system to protect the computer.
f


 

Other sample model essays:

Computer Nerds: Wozniak, Jobs, Gates, and Allen A computer nerd is a person uses a computer in order to use one. Steve Wozniak fell in love with computers and how they worked. He buil...
Information Technology / Computer Literacy
Computer Literacy For over fifty years, beginning with the famous ENIAC, a revolution has been taking place in the United States and the world. The personal computer has changed the w...
Information Technology / Computer Languages
Computer Languages By Nicholas Soer Differences in computer languages is a topic that many people are not familiar with. I was one of those kinds of people before I started researching ...
Information Technology / Computer Ergonomics In The Work Place
Computer Ergonomics In The Work Place Business strive for high production at low cost. This would result in the highest profit for a company. To many businesses, this is only a mirage. Th...
Information Technology / Computer Crimes
Computer Crimes Computer crimes are on the rise 1 in 10 Americans experience some form of a malicious attack on their computer system. If you pay attention to the rest of this speech ...
Information Technology / Computer Crime
Computer Crime I Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come acros...
Information Technology / Coping With Computers
Coping With Computers CIS 101 DECEMBER 20, 1996 PROF. GARTNER While the twentieth century has proven to be a technological revolution, there has not been a single development with as...
Information Technology / CyberPorn: On A Screen Near You
CyberPorn: On A Screen Near You Cybersex. This word brings to mind a barrage of images, which might be on Stra Trek or virtual reality video by aerosmith. Sex is everywhere today--in books...
Cyberspace and the American Dream: A Magna Carta for the Knowledge Age This statement represents the cumulative wisdom and innovation of many dozens of people. It is based primarily on the ...
Communications Decency Act: Regulation In Cyberspace David Hembree October 23, 1996 Dr. Willis Being one of millions of surfers throughout the Internet, I see that fundamen...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD