Computers are electronic devices that manipulate, process, store and retrieve data or information. Computers have been used for a long period to type documents, play games, send emails, and browse the web. Also, computers are used to create and edit spreadsheets, presentations, and even videos (Caldwell, 2013). The different types of computers include desktops, laptops, tablets, and servers. Cyber security refers to the protection of systems, networks, programs, and devices from malicious attacks (Caldwell, 2013). Cyber security prevents attacks, destruction, and loss of data on computer systems of organizations. Strong cyber security is required in organizations to prevent destruction of businesses as well as damaging an individual's personal and financial lives. Computers and cyber security have continued to improve over the years, and it is projected that they will perform better in the future. The paper focuses on discussing the future of computers and cyber security.
For many years in the past, personal computers were big and comprised monitors and keyboards (Choo, 2011). Later on, laptops were introduced and were followed by the iPhone and iPads that changed the computing industry. Technology companies have been conducting research and having worked on visions on how computers and cyber security will look like in the future (Choo, 2011). Computers in the future are expected to be faster and smaller than the current computers. Technological companies believe that the size of computers will be smaller than a deck of cards. Some of the expectations of the future of computers include perceptual computing, intel wireless future, augmented reality, virtual reality, touch surfaces everywhere, emotion-sensing, and wall computing (Caldwell, 2013). Also, the future of computers is expected to be one which has smartphones being used as personal computers. The reality of a desktop computer powered by a smartphone will be achieved in the future. For instance, Microsoft has already developed continuum that allows a maximum of ten Windows phones to display a desktop experience when connected to an external monitor. Therefore, it is expected that smartphones will be used to power desktop computers in the future.
Microsoft intends to develop a wall-sized computer in the future and is expected to be eighty-four inches touchscreen (Caldwell, 2013). Wall computing will be used in video conferencing, presentations as well as video games. Also, the future of computers will involve perceptual computing that includes interacting with personal computers through the use of natural senses. Virtual reality will change the field of computing in the future through specific ways such as how people play games, train soldiers as well as how individuals do businesses. Besides, the future of computers will involve augmented reality that will help in many ways, such as allowing medical students to view the heart on the 3D model in a classroom.
The future of cyber security depends on emerging issues and trends in technology as well as cyber threats. Cyber security is expected to be more enhanced in the future due to the big growing data in companies and the rise in cyber threats both in complexity and volume (Caldwell, 2013). There have been increased rates of system hacking in many companies, including banks. Therefore, the future of cyber security will include intrusion detection, risk mitigation, cloud security, and secure security development. Cyber security will consist of aspects that will help in identifying, tracking, and preventing cybercrime. The future of cyber security involves mechanisms on how to forecast potential risks and planning. Also, the future of cyber security includes cloud computing aspects such as dealing with system vulnerabilities, malicious insiders, and bank account hijackers. Besides, the future of cyber security will consist of intrusion detection that aims at discovering potential harmful activities in a system of a specific organization by criminals (Caldwell, 2013). The future of cyber security will also include the development of more intelligent software and efficient coding that is free from frailties.
Conclusion
The future of computers and cyber security is expected to be more advanced than we currently have. Cybercrimes are on the rise, and therefore more intelligent cyber security measures are expected to be developed in the future. Some of the cybersecurity measures will include intrusion detection, cloud security, cyber-attack risk mitigation techniques, and development of secure software. The future of computers will include exciting aspects such as augmented and virtual reality, touch surfaces everywhere, emotion-sensing and perceptual computing. Besides, future computers are expected to be smaller and faster than the current computers in the markets.
References
Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5-10. Retrieved from https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Future+of+computers+and+cyber+security&oq=cy#d=gs_cit&u=%2Fscholar%3Fq%3Dinfo%3AuoF8dDJO2ZUJ%3Ascholar.google.com%2F%26output%3Dcite%26scirp%3D7%26hl%3Den
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731. Retrieved from https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Future+of+computers+and+cyber+security&oq=cy#d=gs_cit&u=%2Fscholar%3Fq%3Dinfo%3AuoF8dDJO2ZUJ%3Ascholar.google.com%2F%26output%3Dcite%26scirp%3D7%26hl%3Den
Cite this page
The Future of Computers and Cyber Security Essay. (2022, Feb 16). Retrieved from https://proessays.net/essays/the-future-of-computers-and-cyber-security-essay
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Case Study: When Hacking Destroys Your Company
- Critical Thinking Example on Internet Demerits
- Evaluation Essay on Windows 7 Firewall
- Research Paper on Comparing Windows, Apple Mac OS X, and Linux Operating Systems
- Article Analysis Essay on Wasting Time on the Internet and Is Google Making Us Stupid
- Data 101: A Tutorial on Organizing and Retrieving Data - Research Paper
- Border Officials Can Search Your Phone - Essay Sample