Information Technology Security System Essay

2010 Words9 Pages
Thien Doan Sharon Mitchell ENG 112 29 March 2016 Information Technology Security System Introduction People have always concerned about the security of their important documents as well as information. The Roman Empire military delivered sensitive and secure messages on parchments that could be dissolved in water after getting the information. But nowadays, what most of us use to store our documents in the cloud. Cloud computing is one of the common words in this modern world, the 21st century, the practice of using the network to control the servers that hosted on the internet to store, manage, and process data rather than a local server or a personal computer. The security in information technology is considered as the biggest challenge…show more content…
According to Dennis Butler, Information Technology (IT) security was taking an important and creatively role, seemingly for the first time in 1900, and the convergent evolution paralleled a shift in American business. The very early 1900s saw replacing railroads as the major business matter, this large corporation dominated and helped increase better investment profiting better political acceptance (Butler). After the railroad developed and link countries together, the next biggest step was the computer that could transfer information. In the very early 1960s, people saw a great promising value where they could be allowing computers to share information on research and evolving in scientific and military fields: “Appointed J. C. R. Licklider to head the new Information Processing Techniques Office (IPTO). Licklider was given a mandate to further the research of the SAGE system. The SAGE system (see Figure 1.6) was a continental air-defense network commissioned by the U.S. military and designed to help protect the United States against a space- based nuclear attack” (Rittinghouse, 8). According to Leonard Kleinrock, the Advanced Research Projects Agency Network (ARPANET) in 1969, computer networking would largely increase and become sophisticated. He said that computer utilities would become common like the need of the electric and telephone utilities for the individual offices, business and homes across the
Open Document