answersLogoWhite

0


Best Answer

When I hear the word "early computer security, all I can think of are human security men with guns, trying to protect the first huge computer from thieves trying to steal it. At that time, I don't think they were worrying about viruses as compare to real people stealing the computer which can take up to 6 people to carry. Then, I think people were the Virus you'll need protection from.

User Avatar

DR Sam

Lvl 4
4y ago
This answer is:
User Avatar
User Avatar

Petur Iliev

Lvl 1
3y ago
 
User Avatar

Anonymous

Lvl 1
3y ago
Do you want to learn fossil fuel technology for free?
User Avatar

mehreen fathima

Lvl 1
2y ago
really a amazing question
User Avatar

Argyll Langton

Lvl 1
2y ago
weren't the computers back then realy CHONKY
User Avatar

Anonymous TECH Guy

Lvl 1
2y ago
More advanced more function and more loopholes 😂
User Avatar

TESHAWN JAY WHITE

Lvl 1
2y ago
OH
User Avatar

Movies Channel

Lvl 1
2y ago
I found a video that can help you
User Avatar

Abubakr Saeid

Lvl 1
2y ago
Share your link above to earn cash rewards. Shop Now buttons activate sitewide cash back.
User Avatar

eskenazi369

Lvl 1
2y ago
Internet was still in its infancy and a rather closed system, like most things in life when something becomes widespread and has value people will find ways to exploit, be it for financial or other nefarious reasons. Best answer I have.
User Avatar

Temiloluwa.odetundun

Lvl 1
2y ago
Woah that is a very funny answer
User Avatar

Muhammad Usman

Lvl 1
2y ago
Computer security involves protecting software, data, hardware, and other components associated with the computer from cybersecurity threats or damage.
User Avatar

Qcom ltd

Lvl 1
2y ago
IT Security Solution providers, offer digital protection to your business so that you can ensure that your business is in the safe hands of industry professionals and can also be monitored remotely.
User Avatar

Qcom ltd

Lvl 1
2y ago
IT Security Solution providers, offer digital protection to your business so that you can ensure that your business is in the safe hands of industry professionals and can also be monitored remotely.
User Avatar

Максим Пудченко

Lvl 1
2y ago
h ttps://exe.io/yJkaR вбей в ютуб ссылку и посмотри видео и все поймеш
More answers
User Avatar

Beast609

Lvl 4
2y ago

For the personal computers, it was that you save your data on a floppy disc. There weren't passwords and I'm pretty sure Windows Defender came later (correct me if I'm wrong). But there weren't that many reasons to get hacked or someone trying to steal your data, so I guess that's an answer.

This answer is:
User Avatar
User Avatar

Seamus Friesen

Lvl 1
2y ago
where did you get your answer
User Avatar

Beast609

Lvl 1
2y ago
I watched a YouTube video and it was in it. Also I searched it up a little bit on some tech websites.

User Avatar

Abdelrahman Elkhouly

Lvl 3
2y ago

i posed the same question to my grandad, the answer wasn't really satisfying .... at the end of conversation, he advised me to use VIPRE ANTIVIRUS ... i tried it ....it's very good in my humble opinion.

kutt.it/h704Pv

This answer is:
User Avatar
User Avatar

Mateo Lucas

Lvl 1
2y ago
Hi, how are you? here I have two antivirus with a discount coupon, take advantage of it! (the link is with spaces because otherwise the page deletes i) htt ps:// yazing. com/deals/avg/Mateo1 htt p s://yazing. com/deals/ccleaner/Mateo1
User Avatar

Argyll Langton

Lvl 1
2y ago
I feel like ur scammed but also black mailed to say its good in a "humble way"

User Avatar

Oxymem Brane

Lvl 4
2y ago

Early centralized server PCs were utilized to store government records, individual data, and value-based handling. The security was to protect the information put away in the PCs. Consequently, actual admittance to the area was monitored and not many work force approached this area. Access was just accomplished by approved photograph distinguishing proof. The passage and exit to the PC rooms were checked to guarantee that the gadget, just as the information put away in the gadget, was gotten.

For more info visit our Link from Bio

This answer is:
User Avatar

User Avatar

laurenince

Lvl 2
2y ago

perhaps it was just that there were no viruses yet, because, again, there were no computers on which these viruses were created

but at the expense of protection, perhaps it was so!

In 1972, the first computers were released to the public, and some companies were already starting to release software for work in the office with built-in protection

This answer is:
User Avatar

User Avatar

TESHAWN JAY WHITE

Lvl 5
2y ago

When I hear the word "early computer security, all I can think of are human security men with guns, trying to protect the first huge computer from thieves trying to steal it. At that time, I don't think they were worrying about viruses as compare to real people stealing the computer which can take up to 6 people to carry. Then, I think people were the Virus you'll need protection from.

iolo technologies is the world-leaderin PC tune up and optimization software including System Mechanic, Phoenix 360, Privacy Guardian, System Shield, Search & Recovery, Drive Scrubber, System Checkup & more!

This answer is:
User Avatar

User Avatar

Oxymem Brane

Lvl 4
2y ago

The primary occasions in the historical backdrop of abusing security date back to the times of communication. Phone signals were sent by means of copper links. Phone lines could be tapped and discussions could be heard. In the beginning of phone frameworks, phone administrators purposefully misled calls and listened in on discussions. During the 1970s, a bunch of individuals known as phreakers abused the shortcoming of advanced exchanging phone frameworks for entertainment only. Phreakers found the sign recurrence at which the numbers are dialed and attempted to coordinate with the recurrence by blowing a whistle and tricking the electronic changing framework to settle on decisions for nothing. Among these phreakers, John Draper found that he could settle on significant distance decisions for nothing by building an electronic box that could whistle various frequencies

For more info visit our Link From Bio

This answer is:
User Avatar

User Avatar

Peter Langer

Lvl 2
2y ago

I can remember in the late 80's when many computers had no hard drives. Hard drives were very expensive and in order to work you inserted a floppy disk with your program on it and then you could save your work (documents or whatever) on another floppy disk. For security you could lock your floppies away in a cabinet or even a safe.

Password protection was not commong then but it followed a few years later and in the 90's we were introduced to Windows and it didn't take long for the first viruses to surface

This answer is:
User Avatar

User Avatar

Sherita Womack

Lvl 2
2y ago

BOIN FOIN DOIN POIN AOIN QOIN LION GION YION EION WION XION VION RION UION TION NION ZION JOIN.

DATA ORG CONSIGN ON DATA VOTER ENRICHER OF GOV BETA DOT ORG COUNCIL SHIPS SYSTEMS OF AMERICAS COURT>DONEGO< .

NATIONAL AID SYSTEMS AND STRADEGY BUDGET CUTS TIL DONE, DATA OF ENRICHED IRS FORM SIGNED ON TO FED PROCESS UNTIL REGISTERATION EQUALS ZONED + DONE + FINAL SPEECH.

FINAL IRS MUSEUMS DATA HOPEFULLY.

This answer is:
User Avatar

User Avatar

toledanoizan

Lvl 3
2y ago

One of the vital reasons businesses cut down with the lack of mobile app development company in Chennai is that they proceed ahead with the prejudiced concept that it is all about composing functional software for compatible devices such as smartphones and tablets. In opposition to, the strategy revolves not only around development; instead, it involves market research, requirement analysis, front-end design, and usability testing before it leads to the deployment stage.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How did early computer security work?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How does computer security work?

i dont know you tell me ur the computer


Does Avast work as a security computer thing or does it have viruses and if it does what is a good security thing?

joe is the BEST IN THE WORLD


What is the relationship between MULTICS project and the early development of computer security?

Because MULTICS is the first OS to integrate security into its core functions


What is the relationship between the MULTICS project and the early development of computer security?

Because MULTICS is the first OS to integrate security into its core functions


When was Scada Security invented?

SCADA Security was established in the early 2000's. This is a computer based security system that ties together power, oil, and gas pipelines. They are used by many businesses in the US.


Does the first computer still work?

No, however several of the early machines have been replicated and the replicas work. Some of these are:ABCColossus


How secure is the network security of your office computer?

In general, most companies and individuals with private computers, have a basic firewall and security that blocks out potential viruses. The level of security will vary, however, depending on the organization you work for. Some organizations have higher levels of security, blocking out any web page with certain trigger keywords. Generally speaking, you should consider the level of security on an office building to not be secure enough to share private information. You should only be sharing work-related information on a work computer.


How do you get pbuse to work on your computer and not getting the website to be blocked?

We will not tell you how to bypass your schools security protocols - that's illegal !


What was Luis Luis von Ahn's great idea for thwarting spammersHow does it work?

Internal threats to computer security


What is computer and internet security?

Computer security refers to be protected from the viruses present inside your computer whereas Internet security refers to be protected from the malwares those could attack your computer through Internet.


Does age of empire work on a modern day mac?

yes all computer games should work on any computer unless they date back to before the early 1900's.


What are the security and safety procedure within a computer environment?

what are the security and safty procedure in a computer environment