Friday, February 28, 2020

Computer and Securiy Era Research Paper Example | Topics and Well Written Essays - 750 words

Computer and Securiy Era - Research Paper Example 2). This urged the computer professional to think about computer security and a need to create system protecting mechanisms and installing layers of security between the computers of different users. During this time, the concept of protection ring was evolved which is a hierarchical protection domain, that mainly uses hardware resources with some CPU architectures to add security within any system. During 1970s, the computer security field was formally taken for research. Two famous research reports were published in this era (Gollmann, 2011, p. 3). The first one was produced by Willis Ware, who talked about the technical foundations of computer security and also included analysis of the policy requirements of applications. Another report was published by Anderson, which focused on the design of secure computer systems for protecting classified information, such as US defense sector. Thus, the decade of 1970 can be called one of the most important decades in the history of computer security (Gollmann, 2011, p. 6). This was a time when new technologies were being heavily introduced in form of different kinds of applications and hardware resources. These new technologies were creating real issue regarding computer security. For the protection of public and defense data, implementing encryption was seen by government a comprehensive solution for securing computer memory and on backup media. The US Federal Bureau of Standards asked IBM for a data encryption standard, in response of which, the company came up with an algorithm, calling it â€Å"Data Encryption Standard†. The algorithm processes and encryption was then widely discussed in public forums. The birth of cryptography took place. The encryption processes and algorithms were improved by time. The encryption also gives the basic concept and idea of HTTP, HTML and XML, which are extremely important components of the internet (Gollmann, 2011, p. 8). After the introduction of Personal Computers, the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.