, Term Paper
...computer system and that each authorized person should get access to only those applications and data as one is permitted to access (Whitman & Mattord, 2011, p. 397). Physical security or access control is assured by varied technologies like metal locks, biometric scanning and authentication, human and automated monitoring, hidden paths, digital signatures, etc (Whitman & Mattord, 2011, p. 398). Encryption is one of the most popular computer security measures. Encryption primarily involves the encoding of data and information in such a way that only the personnel or computers having the right key are able to decode that data (Russell... ? Computer Security of the of the Concerned August 31, Computer...