Get your essays here, 33,000 to choose from!

Limited Time Offer at Free College Essays!!!

Secrurity

8 Pages 1967 Words


a in the computer. The most
important thing is that we cannot allow those hackers and criminals
entering our computers. It means that we need to design a lock to lock up
all our data or using identification to verify the identity of someone
seeking access to our computers.
The most common method to lock up the data is using a password system.
Passwords are a multi-user computer system's usual first line of defense
against hackers. We can use a combination of alphabetic and number
characters to form our own password. The longer the password, the more
possibilities a hacker's password-guessing program must work through.
However it is difficult to remember a very long passwords. So people will
try to write the password down and it may immediately make it a security
risk. Furthermore, a high speed password-guessing program can find out a
password easily. Therefore, it is not enough for a computer that just have
a password system to protect its data and memory.
Besides password system, a computer company may consider about the
security of its information centre. In the past, people used locks and keys
to limit access to secure areas. However, keys can be stolen or copied
easily. Therefore, card-key are designed to prevent the situation above.
Three types of card-keys are commonly used by banks, computer centers and
government departments. Each of this card-keys can employ an identifying
number or password that is encoded in the card itself, and all are produced
by techniques beyond the reach of the average computer criminals. One of
the three card-key is called watermark magnetic. It was inspired by the
watermarks on paper currency. The card's magnetic strip have a 12-d...

< Prev Page 2 of 8 Next >

Essays related to Secrurity

Loading...