Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

INFORMATION

TECHNOLOGY
Security Mechanisms and Computer Generations
Security Mechanisms
Data security is the practice of protecting digital information from unauthorized access, data
corruption, or theft. It includes security ranging from the physical security of hardware and
storage devices to administrative and access controls, as well as the logical security of software
applications such as passwords and data encryption.
It also includes organizational policies and procedures.
Data corruption refers to errors experienced in computer data that occur during the writing,
storage, or transmission process in which the data loses its integrity and transforms into a form
that is unusable, unreadable or in some other way inaccessible to a user or application.
Corruption is often enabled through an external virus stored or installed within the target device.
The virus overwrites the original data, modifies the code, or permanently deletes it. Besides
viruses, data corruption may also occur as a result of hardware or software malfunctions, errors,
and environmental calamities such as power outages, storms, or other disasters.
Data can be restored through a backup copy, or it can be rebuilt using various data integrity
checking algorithms.
Authentication is the process of verifying a user’s identity to allow access to a particular task as
well as confirming the origin and integrity of data. It includes the use of authentication factors
or simply known as security credentials. These are identifying information components used to
verify identities, such as passwords, PIN’s and biometrics.
The types of authentication processes comprise of:

▪ Primary Authentication – also known as single-factor authentication, requires only one


factor to gain access (e.g., username and password).

▪ Two-Factor Authentication (2FA) – double checks user identity using two factors (e.g.,
username and password, and a code sent to a corresponding phone number).

▪ Single Sign-On (SSO) – users can log in to one application and thus gain access to others via
a company domain.

▪ Multifactor Authentication – uses multiple factors to confirm identity. (e.g., using


passwords, location and even biometrics).
A security mechanism can be termed as a set of processes that deal with recovery and
prevention from security attacks.
Some types of security mechanisms include:

▪ Encipherment – aids in making data confidential. Algorithms are applied to reconstruct data
into a non-readable form.

▪ Notarization – uses a trusted third party to record communication requests between sender
and receiver.

▪ Data Integrity – refers to the accuracy and consistency (validity) of data. As a process, it
describes measures used to ensure validity and accuracy of a data set or all data contained in
a database or other construct. Error checking methods and validation procedures are typically
relied on to ensure the integrity of data that is transferred or reproduced without the intention
of alteration.

▪ Digital Signature – digital data that is unable to be seen by human eyes is added as a sort of
electronic signature by the sender which is thus electronically checked by the receiver.

▪ Access Control – used to prevent unattended/unauthorized access to data being sent via
passwords, firewalls, etc.

Access Control

Access control is a process that regulates parties’ access or authorization to a company’s data,
information, and resources. It allows for an organization to manage who has access to their
resources.
There are two types of access control:

▪ Physical

▪ Logical
Physical Access Control

Physical access control regulates access to physical locations such as campuses, buildings,
rooms, and physical IT assets.
In securing a facility, organizations use electronic access control systems that rely on user
credentials and access card readers to track employee access to restricted locations.
Some of these systems incorporate access control panels to restrict entry to rooms and buildings,
as well as alarms and lockdown capabilities to prevent unauthorized access or operations.
Some physical access control devices include:

▪ Swipe/ Keycards – generally, keycards are small portable cards connected to an


authentication database to allow physical access into a building or any place. Access control
card systems identifies and authorizes the credentials presented by the key card via a swipe,
touching the card to a scanner or by a proximity sensor.

▪ Biometric Scans – includes processes such as fingerprint mapping, facial and voice
recognition, and retina scans. Biometric scanners usually capture a person’s physical features
(in some cases biological such as blood samples) and verify their identity with a saved
database to regulate access.

▪ Personal Identification Number (PIN) – a numeric passcode that is specific to a user.

Logical Access Control

Logical access control regulates access connections to computer networks, system files and data.
Access control systems perform identification authentication and authorization of users and
entities by evaluating required login credentials.
Logical access control mechanisms include:

▪ PIN’s

▪ Biometric Scans

▪ Passwords – these are usually the first line of defense and the most common security
mechanism. A password can be defined as ‘a string of characters used to identify users
during the authentication process’. A strong password contains a variety of numbers, letters
and special characters and are reasonably lengthy (the strength of a password in regard to its
length can vary depending on the requirements of the authentication process.)
▪ Encryption – Data encryption translates data into another form, or code, so that only people
with access to a secret key (formally called a decryption key) or password can read it.
Encrypted data is commonly referred to as ciphertext, while unencrypted data is called
plaintext. The purpose of data encryption is to protect digital data confidentiality as it is
stored on computer systems and transmitted using the internet or other computer networks.

Computer Generations

▪ First Generation (1940 – 1956): Vacuum Tubes

Vacuum tubes, also known as electron tubes/valves, are glass-made devices used to control the
flow of electric current. They we developed by English physicist John Ambrose Fleming in 1904
as a basic component for electronic devices for circuitry. Due to their development, there was
great innovations made in television and radio. Examples of the first computers include ENIAC
and UNIVAC. They were extremely large computer systems.
▪ Second Generation (1956 – 1963): Transistors

Transistors are miniature electronic components which function as either amplifiers or switches.
As an amplifier, they produce larger electric currents upon receiving smaller ones. As a switch,
they use the smaller currents to trigger a larger one, rather than transform it. Computers that were
produced utilized these components rather than vacuum tubes. Transistors made computers more
reliable, smaller in size, faster in speed, more energy-efficient, and cheaper compared to the first
generation of computers. Transistors were invented in Bell Labs in 1947.
Alternatively, transistors can be seen as semi-conductors used to amplify or switch electronic
signals and electronic power. By definition, a semi-conductor neither allows a free-flowing
electric current nor repels it completely, hence the use of the term “semi”. Semi-conductors were
developed in the 1950’s by Jack Kilby and Robert Noyce.
▪ Third Generation (1964 – 1971): Integrated Circuits

Integrated circuits are silicone electronical components (chip) that are composed of a set of
electronic circuits. They replaced the mass use of transistors as a basic computer component. The
idea for integrated circuits was conceived but unsuccessfully developed by radar scientist
Geoffrey Dummer and was later produced by Jack Kilby. Computers were thus smaller in size,
more reliable and efficient than the previous generations.

▪ Fourth Generation (1971 – 2010): Microprocessors

A microprocessor is an integrated circuit that contains all the functions of a central processing
unit. It is a programmable multipurpose silicone chip that performs the instructions and tasks
involved in computer processing. It receives input from input devices, process it according to the
instructions programmed and then produces the necessary output. The first micro-processor was
the Intel 4004 chip developed in 1971. In 1981 IBM introduced their first home computer and in
1984, Apple introduced the Macintosh.
▪ Fifth Generation (present day): Artificial Intelligence

This generation of computers are mainly noted for the use of artificial intelligence (AI) software.
This software is developed to have human-like capabilities, such as speech recognition, problem
solving and decision making. Microsoft’s Cortana and Apple’s Siri are some examples of this
software, as they can receive spoken instructions given by a user and can not only respond in a
similar programmed human voice, but perform the tasks given. In some homes, AI systems are in
place to perform tasks such as operating lights and curtains. AI developments have made impacts
in various fields. For example, prosthetic advancements in medicine.
An important organization that has made great developments in AI technology is CLINC,
founded in 2015. One of its biggest achievements is creating a personal AI assistant for use in the
banking industries. This assistant emulates human intelligence and can understand any type of
natural conversational language as well as boasting the ability to improve itself with every query.
Its main function is to provide users with their banking details and transactions as well as provide
financial advice.

References

Brook, C. (2020, December 1). What is Data Integrity? Retrieved from digitalguardian.com:
https://digitalguardian.com/blog/what-data-integrity-data-protection-101
Delhi Public School. (2020, July 5). Computer: Third Generation. Retrieved from
dpsbokaro.com:
https://www.dpsbokaro.com/dpsi/docs/econtent-2020-21/senior/07.05.2020/VI/WE.pdf
GeeksforGeeks. (2020, September 10). Types of Security Mechanism. Retrieved from
geeksforgeeks.org: https://www.geeksforgeeks.org/types-of-security-mechanism/
javaTpoint. (n.d.). Fifth Generation of Computer. Retrieved from javatpoint.com:
https://www.javatpoint.com/fifth-generation-of-computer
kaspersky. (n.d.). What is Biometrics? How is it used in security? Retrieved from kaspersky.com:
https://www.kaspersky.com/resource-center/definitions/biometrics
Lord, N. (2020, December 1). What is Data Encryption? Retrieved from digitalguardian.com:
https://digitalguardian.com/blog/what-data-encryption
Lutkevich, B. (2020, September). Access Control. Retrieved from techtarget.com:
https://www.techtarget.com/searchsecurity/definition/access-control
M&H Consulting. (2019, October 30). What Are The Five Generations of Computer
Technology? Retrieved from mhconsults.com: https://www.mhconsults.com/blog/what-
are-the-five-generations-of-computer-technology/
openpath. (n.d.). A complete guide to key fob and key card access control systems. Retrieved
from openpath.com: https://www.openpath.com/blog-post/key-card-and-fob-entry-
systems
SailPoint. (2020, September 30). Authentication Methods Used for Network Security. Retrieved
from sailpoint.com: https://www.sailpoint.com/identity-library/authentication-methods-
used-for-network-security/
techopedia. (2017, January 4). Data Corruption. Retrieved from techopedia.com:
https://www.techopedia.com/definition/14680/data-corruption

You might also like