Book contents
- Security in the Cyber Age
- Reviews
- Security in the Cyber Age
- Copyright page
- Epigraph
- Contents
- Boxes
- Preface
- Acknowledgments
- Introduction
- 1 The Emergence of Cyberspace and Its Implications
- 2 From the Abacus to the Computer
- 3 Communicating through Cyberspace
- 4 The Human Dimensions of Cyberspace
- 5 Strategy and Cyberspace
- 6 Domestic Regulation of Cyberspace
- 7 Internet Governance and International Institutions
- 8 International Law and Norms in Cyberspace
- 9 Artificial Intelligence and Ethics
- 10 Conclusions and Future Directions of Cybersecurity Policy
- 11 Leading in the Cyber Age
- Glossary
- References
- Index
2 - From the Abacus to the Computer
Published online by Cambridge University Press: 02 November 2023
- Security in the Cyber Age
- Reviews
- Security in the Cyber Age
- Copyright page
- Epigraph
- Contents
- Boxes
- Preface
- Acknowledgments
- Introduction
- 1 The Emergence of Cyberspace and Its Implications
- 2 From the Abacus to the Computer
- 3 Communicating through Cyberspace
- 4 The Human Dimensions of Cyberspace
- 5 Strategy and Cyberspace
- 6 Domestic Regulation of Cyberspace
- 7 Internet Governance and International Institutions
- 8 International Law and Norms in Cyberspace
- 9 Artificial Intelligence and Ethics
- 10 Conclusions and Future Directions of Cybersecurity Policy
- 11 Leading in the Cyber Age
- Glossary
- References
- Index
Summary
Chapter 2 introduces the reader to the hardware and software of modern computers. It begins by putting computation in a historical context, thereby showing that computation has been a concern of humanity for millennia. Unsurprisingly, modern computers have been foreshadowed by much older calculating devices designed to meet human needs. The chapter also examines operating systems for the efficient management of computer resources and hardware and software abstractions helpful to understanding computers, such as file systems, virtual memories, and high-level programming languages. The important topics of password security, social engineering, and malicious software are introduced as well as techniques to find and remove malware. Although one might expect that hardware would not exhibit security vulnerabilities, that is false. This is illustrated by a subtle bug introduced in the 1990s to make computers run faster by allowing some instructions to be executed out of order but only shown in 2018 to be a serious security hazard.
- Type
- Chapter
- Information
- Security in the Cyber AgeAn Introduction to Policy and Technology, pp. 35 - 72Publisher: Cambridge University PressPrint publication year: 2023