Magna Concursos
857561 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5BBB

The requirements of information security within an organization have undergone two major changes in the last several decades. Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. An example of the former is the use of rugged filing cabinets with a combination lock for storing sensitive documents. An example of the latter is personnel screening procedures used during the hiring process.

With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer became evident. This is especially the case for a shared system, such as a time-sharing system, and the need is even more acute for systems that can be accessed over a public telephone network, data network, or the Internet. The generic name for the collection of tools designed to protect data and to thwart hackers is computer security.

The second major change that affected security is the introduction of distributed systems and the use of networks and communications facilities for carrying data between terminal user and computer and between computer and computer. Network security measures are needed to protect data during their transmission. In fact, the term network security is somewhat misleading, because virtually all business, government, and academic organizations interconnect their data processing equipment with a collection of interconnected networks. Such a collection is often referred to as an internet, and the term internet security is used.

William Stallings. Introduction. In: Cryptography and network security: principles and practice. 3rd ed. New Jersey: Prentice Hall, 2002, p. 2 (adapted).

In text 8A5BBB, the word “former” refers to

 

Provas

Questão presente nas seguintes provas

Analista de Controle - TI

86 Questões