Thursday, May 16, 2019
Computer and Securiy Era Research Paper Example | Topics and Well Written Essays - 750 words
Computer and Securiy Era - look Paper Example2). This urged the computer professional to think about computer security and a claim to create system protecting mechanisms and installing layers of security between the computers of different users. Du bounce this quantify, the concept of protection ring was evolved which is a hierarchical protection domain, that mainly uses hardware resources with some CPU architectures to add security in spite of appearance any system.During 1970s, the computer security field was formally taken for research. Two famous research reports were create in this era (Gollmann, 2011, p. 3). The first one was produced by Willis Ware, who talked about the technical foundations of computer security and as well included analysis of the policy requirements of applications. Another report was published by Anderson, which focused on the purport of secure computer systems for protecting classified information, such as US defense sector.Thus, the decade of 1970 put up be called one of the most important decades in the history of computer security (Gollmann, 2011, p. 6). This was a time when new technologies were being heavily introduced in form of different kinds of applications and hardware resources. These new technologies were creating real produce regarding computer security.For the protection of public and defense data, implementing encoding was seen by government a comprehensive closure for securing computer memory and on backup media. The US Federal Bureau of Standards asked IBM for a data encoding standard, in response of which, the company came up with an algorithm, calling it Data Encryption Standard. The algorithm processes and encryption was then widely discussed in public forums. The birth of cryptography took place. The encryption processes and algorithms were improved by time. The encryption also gives the basic concept and idea of HTTP, HTML and XML, which are extremely important components of the internet (Gollmann, 2 011, p. 8). afterwards the introduction of Personal Computers, the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.