answersLogoWhite

0


Best Answer

When I hear the word "early computer security, all I can think of are human security men with guns, trying to protect the first huge computer from thieves trying to steal it. At that time, I don't think they were worrying about viruses as compare to real people stealing the computer which can take up to 6 people to carry. Then, I think people were the Virus you'll need protection from.

User Avatar

DR Sam

Lvl 4
βˆ™ 2019-12-24 07:25:47
This answer is:
User Avatar
User Avatar

Petur Iliev

Lvl 1
βˆ™ 2020-12-18 12:18:40
Β 
User Avatar

Anonymous

Lvl 1
βˆ™ 2021-01-09 01:59:01
Do you want to learn fossil fuel technology for free?
User Avatar

mehreen fathima

Lvl 1
βˆ™ 2021-03-30 10:55:58
really a amazing question
User Avatar

Argyll Langton

Lvl 1
βˆ™ 2021-04-27 09:44:57
weren't the computers back then realy CHONKY
User Avatar

Anonymous TECH Guy

Lvl 1
βˆ™ 2021-05-13 06:54:33
More advanced more function and more loopholes πŸ˜‚
User Avatar

TESHAWN JAY WHITE

Lvl 1
βˆ™ 2021-06-16 12:20:49
OH
User Avatar

Movies Channel

Lvl 1
βˆ™ 2021-11-10 19:37:12
I found a video that can help you
User Avatar

Abubakr Saeid

Lvl 1
βˆ™ 2021-11-16 10:24:48
Share your link above to earn cash rewards. Shop Now buttons activate sitewide cash back.
User Avatar

eskenazi369

Lvl 1
βˆ™ 2021-12-12 21:10:12
Internet was still in its infancy and a rather closed system, like most things in life when something becomes widespread and has value people will find ways to exploit, be it for financial or other nefarious reasons. Best answer I have.
User Avatar

Temiloluwa.odetundun

Lvl 1
βˆ™ 2022-01-10 07:42:33
Woah that is a very funny answer
User Avatar

Muhammad Usman

Lvl 1
βˆ™ 2022-02-03 05:07:18
Computer security involves protecting software, data, hardware, and other components associated with the computer from cybersecurity threats or damage.
User Avatar

Qcom ltd

Lvl 1
βˆ™ 2022-02-24 06:05:12
IT Security Solution providers, offer digital protection to your business so that you can ensure that your business is in the safe hands of industry professionals and can also be monitored remotely.
User Avatar

Qcom ltd

Lvl 1
βˆ™ 2022-02-24 06:05:12
IT Security Solution providers, offer digital protection to your business so that you can ensure that your business is in the safe hands of industry professionals and can also be monitored remotely.
h ttps://exe.io/yJkaR Π²Π±Π΅ΠΉ Π² ΡŽΡ‚ΡƒΠ± ссылку ΠΈ посмотри Π²ΠΈΠ΄Π΅ΠΎ ΠΈ всС поймСш
Study guides

What was the purpose of the Dawes Act

What is Nepotism

What is one effect the Dawes Severalty Act had on Native Americans

How did railroads increase the need for time zones

➑️
See all cards
3.74
β˜†β˜…β˜†β˜…β˜†β˜…β˜†β˜…β˜†β˜…
27 Reviews
More answers
User Avatar

Beast609

Lvl 4
βˆ™ 2021-08-08 09:12:16

For the personal computers, it was that you save your data on a floppy disc. There weren't passwords and I'm pretty sure Windows Defender came later (correct me if I'm wrong). But there weren't that many reasons to get hacked or someone trying to steal your data, so I guess that's an answer.

This answer is:
User Avatar
User Avatar

Seamus Friesen

Lvl 1
βˆ™ 2021-08-10 01:06:08
where did you get your answer
User Avatar

Beast609

Lvl 1
βˆ™ 2021-08-16 15:09:15
I watched a YouTube video and it was in it. Also I searched it up a little bit on some tech websites.

User Avatar

Abdelrahman Elkhouly

Lvl 3
βˆ™ 2021-03-30 12:07:04

i posed the same question to my grandad, the answer wasn't really satisfying .... at the end of conversation, he advised me to use VIPRE ANTIVIRUS ... i tried it ....it's very good in my humble opinion.

kutt.it/h704Pv

This answer is:
User Avatar
User Avatar

Mateo Lucas

Lvl 1
βˆ™ 2021-04-08 23:02:45
Hi, how are you? here I have two antivirus with a discount coupon, take advantage of it! (the link is with spaces because otherwise the page deletes i) htt ps:// yazing. com/deals/avg/Mateo1 htt p s://yazing. com/deals/ccleaner/Mateo1
User Avatar

Argyll Langton

Lvl 1
βˆ™ 2021-04-27 09:47:07
I feel like ur scammed but also black mailed to say its good in a "humble way"

User Avatar

Oxymem Brane

Lvl 4
βˆ™ 2021-03-24 11:37:15

Early centralized server PCs were utilized to store government records, individual data, and value-based handling. The security was to protect the information put away in the PCs. Consequently, actual admittance to the area was monitored and not many work force approached this area. Access was just accomplished by approved photograph distinguishing proof. The passage and exit to the PC rooms were checked to guarantee that the gadget, just as the information put away in the gadget, was gotten.

For more info visit our Link from Bio

This answer is:
User Avatar

User Avatar

laurenince

Lvl 2
βˆ™ 2021-04-29 10:14:46

perhaps it was just that there were no viruses yet, because, again, there were no computers on which these viruses were created

but at the expense of protection, perhaps it was so!

In 1972, the first computers were released to the public, and some companies were already starting to release software for work in the office with built-in protection

This answer is:
User Avatar

User Avatar

TESHAWN JAY WHITE

Lvl 5
βˆ™ 2021-06-11 13:10:44

When I hear the word "early computer security, all I can think of are human security men with guns, trying to protect the first huge computer from thieves trying to steal it. At that time, I don't think they were worrying about viruses as compare to real people stealing the computer which can take up to 6 people to carry. Then, I think people were the Virus you'll need protection from.

iolo technologies is the world-leaderin PC tune up and optimization software including System Mechanic, Phoenix 360, Privacy Guardian, System Shield, Search & Recovery, Drive Scrubber, System Checkup & more!

This answer is:
User Avatar

User Avatar

Oxymem Brane

Lvl 4
βˆ™ 2021-03-20 12:45:15

The primary occasions in the historical backdrop of abusing security date back to the times of communication. Phone signals were sent by means of copper links. Phone lines could be tapped and discussions could be heard. In the beginning of phone frameworks, phone administrators purposefully misled calls and listened in on discussions. During the 1970s, a bunch of individuals known as phreakers abused the shortcoming of advanced exchanging phone frameworks for entertainment only. Phreakers found the sign recurrence at which the numbers are dialed and attempted to coordinate with the recurrence by blowing a whistle and tricking the electronic changing framework to settle on decisions for nothing. Among these phreakers, John Draper found that he could settle on significant distance decisions for nothing by building an electronic box that could whistle various frequencies

For more info visit our Link From Bio

This answer is:
User Avatar

User Avatar

Peter Langer

Lvl 2
βˆ™ 2021-07-28 18:38:33

I can remember in the late 80's when many computers had no hard drives. Hard drives were very expensive and in order to work you inserted a floppy disk with your program on it and then you could save your work (documents or whatever) on another floppy disk. For security you could lock your floppies away in a cabinet or even a safe.

Password protection was not commong then but it followed a few years later and in the 90's we were introduced to Windows and it didn't take long for the first viruses to surface

This answer is:
User Avatar

User Avatar

Sherita Womack

Lvl 2
βˆ™ 2022-01-25 17:39:03

BOIN FOIN DOIN POIN AOIN QOIN LION GION YION EION WION XION VION RION UION TION NION ZION JOIN.

DATA ORG CONSIGN ON DATA VOTER ENRICHER OF GOV BETA DOT ORG COUNCIL SHIPS SYSTEMS OF AMERICAS COURT>DONEGO< .

NATIONAL AID SYSTEMS AND STRADEGY BUDGET CUTS TIL DONE, DATA OF ENRICHED IRS FORM SIGNED ON TO FED PROCESS UNTIL REGISTERATION EQUALS ZONED + DONE + FINAL SPEECH.

FINAL IRS MUSEUMS DATA HOPEFULLY.

This answer is:
User Avatar

User Avatar

toledanoizan

Lvl 3
βˆ™ 2021-11-06 05:57:01

One of the vital reasons businesses cut down with the lack of mobile app development company in Chennai is that they proceed ahead with the prejudiced concept that it is all about composing functional software for compatible devices such as smartphones and tablets. In opposition to, the strategy revolves not only around development; instead, it involves market research, requirement analysis, front-end design, and usability testing before it leads to the deployment stage.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How did early computer security work?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How does computer security work?

i dont know you tell me ur the computer


Does Avast work as a security computer thing or does it have viruses and if it does what is a good security thing?

joe is the BEST IN THE WORLD


What is the relationship between MULTICS project and the early development of computer security?

Because MULTICS is the first OS to integrate security into its core functions


What is the relationship between the MULTICS project and the early development of computer security?

Because MULTICS is the first OS to integrate security into its core functions


What is example of computer security?

example of computer security software.


What are the issues of computer security?

current issues and trends of computer security


When was Scada Security invented?

SCADA Security was established in the early 2000's. This is a computer based security system that ties together power, oil, and gas pipelines. They are used by many businesses in the US.


What are the concepts of a computer?

computer robot has security the computer.


Difference between network security and computer security?

Computer security is making sure that one single computer is secure Network security is making suer that your network of computers is secure


Where can one get computer system security?

You can get computer system security solutions online from companies such as Microsoft, GOCSI, and Computer Security. With the recent arrival of cloud computing need for computer security has hit an all time high.


How did computer came about?

Computer came from the initiative of make work easy for man. It was the name given to worker in the early days


How can you see if your computer needs computer security?

If it is connected to a network such as the internet, it needs security.

People also asked

What is bigger MB vs GB?

View results