Реферат

Реферат на тему Computer Safety Essay Research Paper About two

Работа добавлена на сайт bukvasha.net: 2015-06-19

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 14.11.2024


Computer Safety Essay, Research Paper

About two hundred years before, the word “computer” started

to appear in the dictionary. Some people even didn’t know what is

a computer. However, most of the people today not just knowing

what is a computer, but understand how to use a computer.

Therefore, computer become more and more popular and

important to our society. We can use computer everywhere and

they are very useful and helpful to our life. The speed and

accuracy of computer made people felt confident and reliable.

Therefore, many important information or data are saved in the

computer. Such as your diary, the financial situation of a oil

company or some secret intelligence of the military department. A

lot of important information can be found in the memory of

computer. So, people may ask a question: Can we make sure that

the information in the computer is safe and nobody can steal it

from the memory of the computer?

Physical hazard is one of the causes of destroying the data

in the computer. For example, send a flood of coffee toward a

personal computer. The hard disk of the computer could be

endangered by the flood of coffee. Besides, human caretaker of

computer system can cause as much as harm as any physical hazard.

For example, a cashier in a bank can transfer some money from one

of his customer’s account to his own account. Nonetheless, the

most dangerous thief are not those who work with computer every

day, but youthful amateurs who experiment at night — the

hackers.

The term “hacker “may have originated at M.I.T. as students’

jargon for classmates who labored nights in the computer lab. In

the beginning, hackers are not so dangerous at all. They just

stole computer time from the university. However, in the early

1980s, hackers became a group of criminals who steal information

from other peoples’ computer.

For preventing the hackers and other criminals, people need

to set up a good security system to protect the data in the

computer. The most important thing is that we cannot allow those

hackers and criminals entering our computers. It means that we

need to design a lock to lock up all our data or using

identification to verify the identity of someone seeking access

to our computers.

The most common method to lock up the data is using a

password system. Passwords are a multi-user computer system’s

usual first line of defense against hackers. We can use a

combination of alphabetic and number characters to form our own

password. The longer the password, the more possibilities a

hacker’s password-guessing program must work through. However it

is difficult to remember a very long passwords. So people will

try to write the password down and it may immediately make it a

security risk. Furthermore, a high speed password-guessing

program can find out a password easily. Therefore, it is not

enough for a computer that just have a password system to protect

its data and memory.

Besides password system, a computer company may consider

about the security of its information centre. In the past, people

used locks and keys to limit access to secure areas. However,

keys can be stolen or copied easily. Therefore, card-key are

designed to prevent the situation above. Three types of card-keys

are commonly used by banks, computer centers and government

departments. Each of this card-keys can employ an identifying

number or password that is encoded in the card itself, and all

are produced by techniques beyond the reach of the average

computer criminals. One of the three card-key is called watermark

magnetic. It was inspired by the watermarks on paper currency.

The card’s magnetic strip have a 12-digit number code and it

cannot be copied. It can store about two thousand bits in the

magnetic strip. The other two cards have the capability of

storing thousands of times of data in the magnetic strip. They

are optical memory cards (OMCs) and Smart cards. Both of them are

always used in the security system of computers.

However, it is not enough for just using password system and

card-keys to protect the memory in the computer. A computer

system also need to have a restricting program to verify the

identity of the users. Generally, identity can be established by

something a person knows, such as a password or something a

person has, such as a card-key. However, people are often forget

their passwords or lose their keys. A third method must be used.

It is using something a person has — physical trait of a human

being.

We can use a new technology called biometric device to

identify the person who wants to use your computer. Biometric

devices are instrument that perform mathematical analyses of

biological characteristics. For example, voices, fingerprint and

geometry of the hand can be used for identification. Nowadays,

many computer centers, bank vaults, military installations and

other sensitive areas have considered to use biometric security

system. It is because the rate of mistaken acceptance of

outsiders and the rejection of authorized insiders is extremely

low.

Individuality of vocal signature is one kind of biometric

security system. The main point of this system is voice

verification. The voice verifier described here is a

developmental system at American Telephone and Telegraph. Only

one thing that people need to do is repeating a particular phrase

several times. The computer would sample, digitize and store what

you said. After that, it will built up a voice signature and make

allowances for an individual’s characteristic variations. The

theory of voice verification is very simple. It is using the

characteristics of a voice: its acoustic strength. To isolate

personal characteristics within these fluctuations, the computer

breaks the sound into its component frequencies and analyzes how

they are distributed. If someone wants to steal some information

from your computer, the person needs to have a same voice as you

and it is impossible.

Besides using voices for identification, we can use

fingerprint to verify a person’s identity because no two

fingerprints are exactly alike. In a fingerprint verification

system, the user places one finger on a glass plate; light

flashes inside the machine, reflects off the fingerprint and is

picked up by an optical scanner. The scanner transmits the

information to the computer for analysis. After that, security

experts can verify the identity of that person by those

information.

Finally, the last biometric security system is the geometry

of the hand. In that system, the computer system uses a

sophisticated scanning device to record the measurements of each

person’s hand. With an overhead light shining down on the hand, a

sensor underneath the plate scans the fingers through the glass

slots, recording light intensity from the fingertips to the

webbing where the fingers join the palm. After passing the

investigation of the computer, people can use the computer or

retrieve data from the computer.

Although a lot of security system have invented in our

world, they are useless if people always think that stealing

information is not a serious crime. Therefore, people need to pay

more attention on computer crime and fight against those hackers,

instead of using a lot of computer security systems to protect

the computer.

Why do we need to protect our computers ?

It is a question which people always ask in 18th century. However,

every person knows the importance and useful of a computer security

system.

In 19th century, computer become more and more important and

helpful. You can input a large amount of information or data in a small

memory chip of a personal computer. The hard disk of a computer system is

liked a bank. It contained a lot of costly material. Such as your diary,

the financial situation of a trading company or some secret military

information. Therefore, it just like hire some security guards to protect

the bank. A computer security system can use to prevent the outflow of

the information in the national defense industry or the personal diary in

your computer.

Nevertheless, there is the price that one might expect to pay for

the tool of security: equipment ranging from locks on doors to

computerized gate-keepers that stand watch against hackers, special

software that prevents employees to steal the data from the company’s

computer. The bill can range from hundreds of dollars to many millions,

depending on the degree of assurance sought.

Although it needs to spend a lot of money to create a computer

security system, it worth to make it. It is because the data in a

computer can be easily erased or destroyed by a lot of kind of hazards.

For example, a power supply problem or a fire accident can destroy all

the data in a computer company. In 1987, a computer centre inside the

Pentagon, the US military’s sprawling head quarters near Washington, DC.,

a 300-Watt light bulb once was left burning inside a vault where computer

tapes were stored. After a time, the bulb had generated so much heat that

the ceiling began to smelt. When the door was opened, air rushing into

the room brought the fire to life. Before the flames could be

extinguished, they had spread consume three computer systems worth a

total of $6.3 million.

Besides those accidental hazards, human is a great cause of the

outflows of data from the computer. There have two kind of people can go

in the security system and steal the data from it. One is those trusted

employee who is designed to let in the computer system, such as

programmers, operators or managers. Another kind is those youth amateurs

who experiment at night —-the hackers.

Let’s talk about those trusted workers. They are the groups who can

easily become a criminal directly or indirectly. They may steal the

information in the system and sell it to someone else for a great profit.

In another hand, they may be bribed by someone who want to steal the

data. It is because it may cost a criminal far less in time and money to

bride a disloyal employee to crack the security system.

Beside those disloyal workers, hacker is also very dangerous. The

term “hacker” is originated at M.I.T. as students’ jargon for classmates

who doing computer lab in the night. In the beginning, hackers are not so

dangerous at all. They just stole some hints for the test in the

university. However, in early 1980s, hacker became a group of criminal

who steal information from other commercial companies or government

departments.

What can we use to protect the computer ?

We have talked about the reasons of the use of computer security

system. But what kind of tools can we use to protect the computer. The

most common one is a password system. Password are a multi-user computer

system’s which usual used for the first line of defense against

intrusion. A password may be any combination of alphabetic and numeric

characters, to maximum lengths set by the e particular system. Most

system can accommodate passwords up to 40 characters. However, a long

passwords can be easily forget. So, people may write it down and it

immediately make a security risk. Some people may use their first name or

a significant word. With a dictionary of 2000 common names, for instance,

a experienced hacker can crack it within ten minutes.

Besides the password system, card-keys are also commonly used.

Each kind of card-keys can employ an identifying number or password that

is encoded in the card itself, and all are produced by techniques beyond

the reach of the average computer criminal. Three types of card usually

used. They are magnetic watermark, Optical memory card and Smart card.

However, both of the tools can be easily knew or stole by other

people. Password are often forgotten by the users and card-key can be

copied or stolen. Therefore, we need to have a higher level of computer

security system. Biometric device is the one which have a safer

protection for the computer. It can reduce the probability of the

mistaken acceptance of outsider to extremely low. Biometric devices are

instrument that perform mathematical analyses of biological

characteristics. However, the time required to pass the system should not

be too long. Also, it should not give inconvenience to the user. For

example, the system require people to remove their shoes and socks for

footprint verification.

Individuality of vocal signature is one kind of biometry security

system. They are still in the experimental stage, reliable computer

systems for voice verification would be useful for both on-site and

remote user identification. The voice verifier described here is invented

by the developmental system at American Telephone and Telegraph.

Enrollment would require the user to repeat a particular phrase several

times. The computer would sample, digitize and store each reading of the

phrase and then, from the data, build a voice signature that would make

allowances for an individual’s characteristic variations.

Another biometric device is a device which can measuring the act of

writing. The device included a biometric pen and a sensor pad. The pen

can converts a signature into a set of three electrical signals by one

pressure sensor and two acceleration sensors. The pressure sensor can

change in the writer’s downward pressure on the pen point. The two

acceleration sensor can measure the vertical and horizontal movement.

The third device which we want to talk about is a device which can

scan the pattern in the eyes. This device is using an infrared beam which

can scan the retina in a circular path. The detector in the eyepiece of

the device can measure the intensity of the light as it is reflected from

different points. Because blood vessels do not absorb and reflect the

same quantities of infrared as the surrounding tissue, the eyepiece

sensor records the vessels as an intricate dark pattern against a lighter

background. The device samples light intensity at 320 points around the

path of the scan , producing a digital profile of the vessel pattern. The

enrollment can take as little as 30 seconds and verification can be even

faster. Therefore, user can pass the system quickly and the system can

reject those hackers accurately.

The last device that we want to discuss is a device which can map

the intricacies of a fingerprint. In the verification system, the user

places one finger on a glass plate; light flashes inside the machine

,reflect off the fingerprint and is picked up by an optical scanner. The

scanner transmits the information to the computer for analysis.

Although scientist have invented many kind of computer security

systems, no combination of technologies promises unbreakable security.

Experts in the field agree that someone with sufficient resources can

crack almost any computer defense. Therefore, the most important thing is

the conduct of the people. If everyone in this world have a good conduct

and behavior, there is no need to use any complicated security system to

protect the computer.

326


1. Курсовая Насилие как социально-психологический феномен
2. Курсовая Процессы принятия решение в организациях
3. Доклад на тему Транспортировка товаров в магазин
4. Реферат Значение рекламы в современной экономике
5. Доклад Диалектология 2
6. Контрольная работа Арбітражна угода та арбітражне застереження
7. Реферат Экономическая эффективность производства кормов в ОАО Молодая гвардия
8. Реферат Электрический расчет несимметричных проволочных антенн
9. Реферат Виды логистики и области ее исследования
10. Реферат на тему Battery Failure Electro Chemistry Essay Research Paper