.

Tuesday, January 8, 2013

Security

2. What is the difference between vulnerability and exposure? Vulnerability is a weakness or a fault within the transcription, much(prenominal) as software package flaws, unlocked doors, or an unshielded trunk port. Vulnerability leaves things open to an attack or damage. picture show on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the energize of exposure (system open for attack). 4. What type of security was dominant in the early years of computing? Security, in its earliest years, consisted of principally physical security, the need to safeguard the equipment itself. During the next decade, when ARPANET grew in use, to a greater extent than advanced security was needed. This led to the creation of MULTICS, an operating system with security being its main concern. From MULTICS spawned the UNIX operating system which did non require the same in-depth levels of security. In the early 1970s the password exercise was implemented as one of the first security measures. As computers and networking became more wide spread, during the 1990s, some security measures were implemented though they were seen as a low priority. Because of the lack of security in the start, we now have many of the problems that exist today. 6. If the C.I.A.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
triplicity is incomplete, why is it so commonly used in security? The C.I.A. triangle is the industry bill for computer security. It has existed since the development of the mainframe. Because it is the industry standard it is all the same used today because its characteristics; confidentiality, integrity, and availability are still just as important in todays society. However, it no longer addresses the full breadth of security concerns faced today, so it instead serves as a foundation for a more advanced system, known as the expanded C.I.A. triangle. 8. Identify the 5 components of an information system. Which are most directly impacted by the study of computer security? Which are... If you want to get a full essay, order it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment