Computer security Essays

Filter filter
Sort by filter
73 essay samples is found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

Ecommerce | Business Dissertations

2.1. Introduction to e-Commerce ‘Electronic commerce (e-Commerce) is such a service offering people the opportunity to do their shopping via modern information and communication technologies at home’ (Schultz, 2007). It enables everyone to conduct business via the Internet. The only precondition is a computer and a connection to the Internet. The term e-Commerce is becoming […]

Pages: 39 Words: 11817 Topics: Computer Security, Credit Card, Economy, Online Shopping, Research, Travel Agency, Trust

Pour Faire Face à La Concurrence

Introduction: Pour faire face à la concurrence internationale, s’adapter à la mutation économique et jouir de l’évolution technologique surtout dans le domaine des télécommunications. D’une part convaincue de la nécessité de TIC qu’est au cœur de la stratégie de croissance des entreprises et de l’économie numérique. L’Etat ne cesse d’instaurer un environnement favorable pour encourager […]

Pages: 66 Words: 19669 Topics: Bank, Computer Science, Computer Security, Cryptography, Economy, Online Banking
Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

Password Management Security System

Project Aim: Passwords management is an important aspect of computer security, it’s the front line of protection for user terminals and it is by far the most common user authentication method within the largest multinational organizations. A poorly chosen password will increase the probability for an information system to be compromised. As such, all organization […]

Pages: 34 Words: 10165 Topics: Computer Security, Crime Prevention, Cryptography, Information Security, Malware, Operating System

The Security Management

The Security Management Industry INTRODUCTION Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate security products. Security management is a broad term that encompasses several currently distinct market segments. With the presence of the Internet, spam is becoming increasingly costly and dangerous as spammers deliver […]

Pages: 27 Words: 8172 Topics: Competitive Advantage, Computer Security, Information Security, Innovation, Malware, Organizational Culture, Strategic Management

Visual Cryptography Provides

Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to […]

Pages: 45 Words: 13355 Topics: Computer Security, Cryptography, Research, Secrecy

Computers Security Business | Information Systems Dissertations

Introduction While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside […]

Pages: 39 Words: 11616 Topics: Computer Networking, Computer Security, Cyber Security, Database, Information Security, Malware, Risk, Risk Management

Control System Security

ABSTRACT Access control systems within an enterprise system are used to control the actions, functions, applications, and operations of legitimate users within an organization and to protect the integrity of the information stored within the system. Role-based access control (RBAC) is a relatively new access control system that maps to organizational-specific structures in a way […]

Pages: 60 Words: 18144 Topics: Computer Security

Data Confidentiality Integrity

ABSTRACT In the world of today, where time is money and information is a corporate asset, protection of data confidentiality and integrity has become critical. Today, companies are focusing much more on how to secure their businesses from identity fraud, which has emerged as the modern day menace. As I found research on identity theft […]

Pages: 57 Words: 17177 Topics: Computer Networking, Computer Security, Contract, Credit Card, Identity Theft, Online Shopping, Research

Metamorphic Viruses

Analysis and Detection Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being […]

Pages: 33 Words: 9858 Topics: Computer Engineering, Computer, Computer Science, Computer Security, Computer Virus, Malware, Software

Security Forensics and Risk Management

Acknowledgement Foremost I would like say thanks to god for all support in all my life and secondly University of Greenwich to give this my life aim to complete my masters. Next my supervisor Professor Kevin Parrott to the supports he gave because without his support I wouldn’t be able to complete my project with […]

Pages: 24 Words: 7218 Topics: Computer, Computer Networking, Computer Security, Computer Virus, Malware, Software, Vulnerability

About Wireless Network

CHAPTER 1 – INTRODUCTION 1.1Background Starting of wireless Network is a result of a research Project carried out by University of Hawaii. Initially it’s called as Aloha net, but later it used to call as Wireless Local Area Network or WLAN. At the beginning of aloha net, is capable of transferring 1 to 2 mbps […]

Pages: 38 Words: 11276 Topics: Computer Networking, Computer Security, Cryptography, Digital Technology

Application Network Security

2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at which computer networks are expanding in this modern time to accommodate higher bandwidth, unique storage […]

Pages: 24 Words: 7116 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Digital Technology, Information Technology, Linux, Operating System

Firewall Internet Protocol. – Information Technology Dissertations

Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for […]

Pages: 22 Words: 6707 Topics: Computer Networking, Computer Security, Digital Technology, Information Technology

Generic Access Method for Network Resources

Abstract We are living in the communication era. The communication technology is growing at a fast pace. From the market survey, it has been shown that the fastest growing demand in the market was for electronics items in the past before 1990s. After the introduction of the mobile technology in the market, the demand for […]

Pages: 42 Words: 12518 Topics: Communication, Computer Networking, Computer Security, Cyberspace, Information Security, Information Technology, Network

Identification Process of Human Beings

Abstract Facial recognition is a crucial factor of everyday identification processes: human beings recognize and evaluate each other by means of the face. Whenever driving licences, identity and membership cards are checked or wherever access is controlled by security staff, the identity is verified by looking into somebody’s face. Thus, unlike other biometric features, e.g. […]

Pages: 57 Words: 17237 Topics: Computer Security, Database, Fingerprint, Surveillance

Impact of it on Bank’s Performance

IMPACT OF INTERNET TECHNOLOGY ON BANK’S PERFORMANCE AND CUSTOMER’S SATISFACTION ABSTRACT Internet technology is very popular and has many benefits for the users; however it does has some elements of security risks to the bank and its customers at large. In this research work, I intend to look at impact of internet technology on Bank, […]

Pages: 44 Words: 13338 Topics: Bank, Computer Networking, Computer Security, Credit Card, Fraud, Identity Theft, Information Security

Linux Operating System

TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and […]

Pages: 29 Words: 8608 Topics: Computer Engineering, Computer Networking, Computer Security, Computer Virus, Linux, Malware, Operating System

Networking

Introduction About Philadelphia Inc. Philadelphia Inc. is a large multinational company which is emphasis mainly in producing of computer software and manufacturing of computer and its accessories. It has branches all over the world, nearly about 12 countries. The headquarter is in Philadelphia town in USA which has 13 large departments. These are Front-desk Department, […]

Pages: 29 Words: 8737 Topics: Computer Networking, Computer Security, Computer Virus, Cyberspace, Digital Technology, Information Technology

Network System’s for Secure Communication

Network System’s for Secure Communication Methodology: The main methodology involved behind this research project is to provide the importance of such technology from professionals and well referred articles. Some of the general interviews will be added to the project with details showing their interest towards the current technology and also the change they see in […]

Pages: 34 Words: 10163 Topics: Computer Networking, Computer Security, Cryptography, Cyberspace, Digital Technology, Information Technology, Ipv6

Online Transaction

1.0 Introduction Years ago, consumer need to step out from home for buying groceries, settle bills, making transactions and others daily activities. But in nowadays, consumer can simply sit in front of computer with the available of internet connection to complete all of those daily activities with the help of online transaction. Online transaction becomes […]

Pages: 31 Words: 9221 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Malware, Phishing, Software

PGP Desktop TCP

Task-1:-PGP………………………………………………Page-5-To-14 Problem statement…………………………………………… Download PGP Desktop software……………………….. Experiment with new installation using the following features: 1.Key management …………………………………….. 2.Securing E-mail Messages …………………………… 3.Securing Instant Messaging …………………………. c) Experiment and report on the remaining option available under the licence…………………………………………….. Task-2:- TCP/IP Security…………………………………Page-15-To-20 Problem statement………………………………………… Why TCP/IP Network are considered unsecured……. Describe the following technologies: SSL (Secure […]

Pages: 21 Words: 6388 Topics: Computer Engineering, Computer, Computer Networking, Computer Security, Operating System, Software

Smartphone Security Awareness

1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and […]

Pages: 34 Words: 10133 Topics: Android, Computer Security, Computer Virus, Cyber Security, Malware, Mobile Phone, Operating System, Smartphone

Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and Mobile Devices

1.0 INTRODUCTION 1.1PROJECT OUTLINE The title of the project chosen by the author is “Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices” which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on […]

Pages: 53 Words: 15805 Topics: Computer Security, Data Analysis, Malware, Qualitative Research, Reliability, Research, Trust

Technology Internet Security

Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major issues to most businesses and organisations in Saudi Arabia. Media hype surrounding the topic of Internet security can scare the […]

Pages: 47 Words: 14187 Topics: Computer Networking, Computer Security, Computer Virus, Cryptography, Cyber Security, Online Shopping, Research, Retail

The Impact of Spyware on Computers and Mobile Devices

1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn […]

Pages: 49 Words: 14568 Topics: Computer Security, Data Analysis, Malware, Qualitative Research, Reliability, Research, Trust

The Use of Modernised Technology

Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the globe to communicate and share information. Due to this growing computer technology, the need for an improved network service which involves public accessing […]

Pages: 39 Words: 11796 Topics: Computer Security, Database, Fingerprint, Information Security, Research, Risk, Vulnerability

Traditionally Surveillance was Done Manually

Abstract Surveillance is proving to be very effective technique to ensure the feeling of safety and security among the people of a state. Traditionally surveillance was done manually using human patrolling by police and law maintaining bodies in the city. Then with the advent of CCTVs we started using video surveillance. Though there are many […]

Pages: 33 Words: 10035 Topics: Computer Security, Privacy, Research, Surveillance

Visual Information Encryption

Visual Information Encryption Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. […]

Pages: 46 Words: 13814 Topics: Computer Security, Cryptography, Secrecy

VPN Stands for Virtual Private Network or Virtual Private Networking.

Pop Quiz! VPN stands for… A.1 VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only "virtually" private, however, because this data actually travels over shared public networks instead of […]

Pages: 27 Words: 8194 Topics: Computer Networking, Computer Security, Computer Virus, Linux, Malware, Microsoft Office, Operating System

What is Security Incident?

EXECUTIVE SUMMARY 1INTRODUCTION Expect the unexpected. As soon as a crisis erupts, it should be immediately handled to reduce its potential impact on critical business operations. Such undesirable incidents occur unanticipated and when they do take place, damage or harm is the result. In most aspects of life, it is better to stop something disastrous […]

Pages: 44 Words: 13201 Topics: Computer Security, Cyber Security, Employment, Information, Information Security, Recruitment, Team, Training
1 2 3
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price