computing machine              Security    Sean Marc Mohammed  Student ID: 00046127                              Presented to: Mr. Dexter Absalom     The History of Computer Security         Computer  shelter,  mean safeguarding hardware, software and their strong-arm locations,  first-class honours degree took shape in  knowledge base War 2, when the  war machine began using mainframes designed to assist in code breaking.                  irritate was controlled and maintained with the use of IDs, keys and restricting  retrieve to only  current staff, as measures against theft of info and equipment. As time passed and  great levels of security were needed, many technological and  daedal systems were  haveed.      1960s- As   more than than mainframes were put into use during the war, it became obvious that a more  comfortable method of communication between figurer centers was needed. As a result, Larry Roberts, hailed as the internets founder, designed the ARPANET(Advanced Researc   h Projects  agency Network), which is called the internets predecessor.  1970s/80s- While ARPANET grew in popularity, and use during this time, so did the likelihood of it  world wrongly used. Robert M.

 Metcalfe pointed  come to the fore many flaws with its security features, such as password vulnerability,  drop of authorization for system  advance and  postcode safety procedures for  operate up connections.This lack of security was  turn to by the surgical incision of Defence in 1967 and was placed in researchers hands to develop security measures beyond merely safeguarding physical locations.    1990s- The need fo   r networks to be connected became more and m!   ore  needed as computers became more common. The internet was born from this. Originally rigorously government property, it was  do available to the public, allowing practically all computers with access to a  b revise line to connect. In the internets early days, security in any form or mail  encoding or authentication wasnt seen as priority.  2000s- Everyday, millions of unsecure networks and computers are in constant communication....If you want to get a full essay, order it on our website: 
OrderCustomPaper.comIf you want to get a full essay, visit our page: 
write my paper   
 
No comments:
Post a Comment