Computer Security

3212 Words7 Pages

Computer Security

In the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especially in the United States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what is happening on Wall Street, even if he is thousands of miles away from there. Any user of this network can buy, sell, and make money by staying in his bed. But in order to guarantee the stability of such a world where a lot of transactions occur, billions of dollars are at stake, there must be some kind of security to regulate the traffic of information between millions of interconnected computers. Even if computer security techniques are more and more effective, there are still threats to my security as a user of the Internet. It would be interesting to understand the concept of computer security and its techniques before explaining what are the threats to computer security, and finally looking to its application on the Internet.

Computer security has been important since the creation of the Internet. Still, Steven L. Shaffer and Alan R. Simon describe it as being one of the largest difficulties with which the computer technology industry is confronted today (21). Computer Security is “the generic name for the collection of tools designed to protect data and to thwart hackers” (Stallings 1). It is important to guarantee such security to protect data while it is transmitted. When there are many computer security services in a network, the transmission of information has to be ...

... middle of paper ...

.... 2001.

*Macgregor, Robert S. www.Security. Upper Saddle River, NJ: Prentice Hall, 1996.

*Protos, John. ”The High Cost of Cyber Crime.” Business Week 26 Mar. 2001: 52.

*Shaffer, Steven L., and Alan R. Simon. Network Security. Boston, MA: AP Professional, 1994.

*Stallings, William. Network and Internetwork Security. Englewood Cliffs, NJ: IEEE P, 1995.

*Wayner, Peter. Digital Cash. Boston, MA: AP Professional, 1996.

*“What is Hacking?” Online Posting. 17 Mar. 1998. 08 Apr. 2001. Available:

http://www.hackers.com/html/hdcfaq.html#008.

*“Why Cryptography is Harder Than it Looks.” Online Posting. 24 Mar. 2001. Counterpane Systems. 8 Apr. 2001. Available: http://www.counterpane.com/whycrypto.html.

*Willing, Richard, and Salina Khan. “Search for Love Bug Creator Narrows Female Suspect in Philippines may be Arrested Today.” USA Today 8 May 2000: 1B.

More about Computer Security

Open Document