Why Is Computer Security So Weak?

Come On, Guys! Can’t You Do Better?
  • Marvin Waschke


In the early days of computing, placing computers under lock and key protection was enough to secure them. Computing began with the elaborate mechanical computer plans of Charles Babbage and Ada Lovelace in the 19th Century and was carried on through the reinvention of computing prior and during World War II. In the second half of the 20th Century, computers became personal devices that could be used by anyone. Networks, the Internet, and the World Wide Web transformed computers into globally accessible communications tools for everyone on the planet. This access explosion neutralized lock and key protections and fostered ubiquitous cybercrime. The industry is scrambling to catch up.


Personal Computer Transmission Control Protocol Local Area Network Wide Area Network Packet Switching 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Marvin Waschke 2017

Authors and Affiliations

  • Marvin Waschke
    • 1
  1. 1.BellinghamUSA

Personalised recommendations