Computer Security Essays

65 essay samples found

Ecommerce | Business Dissertations

2.1. Introduction to e-Commerce ‘Electronic commerce (e-Commerce) is such a service offering people the opportunity to do their shopping via modern information and communication technologies at home’ (Schultz, 2007). It enables everyone to conduct business via the Internet. The only precondition is a computer and a connection to the Internet. The term e-Commerce is becoming […]

Pages: 39 Words: 11817 Topics: Computer Security, Credit Card, Economy, Online Shopping, Research, Travel Agency, Trust

Password Management Security System

Project Aim: Passwords management is an important aspect of computer security, it’s the front line of protection for user terminals and it is by far the most common user authentication method within the largest multinational organizations. A poorly chosen password will increase the probability for an information system to be compromised. As such, all organization […]

Pages: 34 Words: 10165 Topics: Computer Security, Crime Prevention, Cryptography, Information Security, Malware, Operating System
Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

The Security Management

The Security Management Industry INTRODUCTION Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate security products. Security management is a broad term that encompasses several currently distinct market segments. With the presence of the Internet, spam is becoming increasingly costly and dangerous as spammers deliver […]

Pages: 27 Words: 8172 Topics: Competitive Advantage, Computer Security, Information Security, Innovation, Malware, Organizational Culture, Strategic Management

Control System Security

ABSTRACT Access control systems within an enterprise system are used to control the actions, functions, applications, and operations of legitimate users within an organization and to protect the integrity of the information stored within the system. Role-based access control (RBAC) is a relatively new access control system that maps to organizational-specific structures in a way […]

Pages: 60 Words: 18144 Topics: Computer Security

Metamorphic Viruses

Analysis and Detection Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being […]

Pages: 33 Words: 9858 Topics: Computer Engineering, Computer, Computer Science, Computer Security, Computer Virus, Malware, Software

Security Forensics and Risk Management

Acknowledgement Foremost I would like say thanks to god for all support in all my life and secondly University of Greenwich to give this my life aim to complete my masters. Next my supervisor Professor Kevin Parrott to the supports he gave because without his support I wouldn’t be able to complete my project with […]

Pages: 24 Words: 7218 Topics: Computer, Computer Networking, Computer Security, Computer Virus, Malware, Software, Vulnerability

About Wireless Network

CHAPTER 1 – INTRODUCTION 1.1Background Starting of wireless Network is a result of a research Project carried out by University of Hawaii. Initially it’s called as Aloha net, but later it used to call as Wireless Local Area Network or WLAN. At the beginning of aloha net, is capable of transferring 1 to 2 mbps […]

Pages: 38 Words: 11276 Topics: Computer Networking, Computer Security, Cryptography, Digital Technology

Application Network Security

2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at which computer networks are expanding in this modern time to accommodate higher bandwidth, unique storage […]

Pages: 24 Words: 7116 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Digital Technology, Information Technology, Linux, Operating System

Firewall Internet Protocol. – Information Technology Dissertations

Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for […]

Pages: 22 Words: 6707 Topics: Computer Networking, Computer Security, Digital Technology, Information Technology

Generic Access Method for Network Resources

Abstract We are living in the communication era. The communication technology is growing at a fast pace. From the market survey, it has been shown that the fastest growing demand in the market was for electronics items in the past before 1990s. After the introduction of the mobile technology in the market, the demand for […]

Pages: 42 Words: 12518 Topics: Communication, Computer Networking, Computer Security, Cyberspace, Information Security, Information Technology, Network

Identification Process of Human Beings

Abstract Facial recognition is a crucial factor of everyday identification processes: human beings recognize and evaluate each other by means of the face. Whenever driving licences, identity and membership cards are checked or wherever access is controlled by security staff, the identity is verified by looking into somebody’s face. Thus, unlike other biometric features, e.g. […]

Pages: 57 Words: 17237 Topics: Computer Security, Database, Fingerprint, Surveillance

Linux Operating System

TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and […]

Pages: 29 Words: 8608 Topics: Computer Engineering, Computer Networking, Computer Security, Computer Virus, Linux, Malware, Operating System

Networking

Introduction About Philadelphia Inc. Philadelphia Inc. is a large multinational company which is emphasis mainly in producing of computer software and manufacturing of computer and its accessories. It has branches all over the world, nearly about 12 countries. The headquarter is in Philadelphia town in USA which has 13 large departments. These are Front-desk Department, […]

Pages: 29 Words: 8737 Topics: Computer Networking, Computer Security, Computer Virus, Cyberspace, Digital Technology, Information Technology

Online Transaction

1.0 Introduction Years ago, consumer need to step out from home for buying groceries, settle bills, making transactions and others daily activities. But in nowadays, consumer can simply sit in front of computer with the available of internet connection to complete all of those daily activities with the help of online transaction. Online transaction becomes […]

Pages: 31 Words: 9221 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Malware, Phishing, Software

PGP Desktop TCP

Task-1:-PGP………………………………………………Page-5-To-14 Problem statement…………………………………………… Download PGP Desktop software……………………….. Experiment with new installation using the following features: 1.Key management …………………………………….. 2.Securing E-mail Messages …………………………… 3.Securing Instant Messaging …………………………. c) Experiment and report on the remaining option available under the licence…………………………………………….. Task-2:- TCP/IP Security…………………………………Page-15-To-20 Problem statement………………………………………… Why TCP/IP Network are considered unsecured……. Describe the following technologies: SSL (Secure […]

Pages: 21 Words: 6388 Topics: Computer Engineering, Computer, Computer Networking, Computer Security, Operating System, Software

Smartphone Security Awareness

1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and […]

Pages: 34 Words: 10133 Topics: Android, Computer Security, Computer Virus, Cyber Security, Malware, Mobile Phone, Operating System, Smartphone

Technology Internet Security

Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major issues to most businesses and organisations in Saudi Arabia. Media hype surrounding the topic of Internet security can scare the […]

Pages: 47 Words: 14187 Topics: Computer Networking, Computer Security, Computer Virus, Cryptography, Cyber Security, Online Shopping, Research, Retail

The Impact of Spyware on Computers and Mobile Devices

1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which simply means that the author analyzes the impact of spyware through an empirical study. The study focuses on the factors that influence the spyware growth which in turn […]

Pages: 49 Words: 14568 Topics: Computer Security, Data Analysis, Malware, Qualitative Research, Reliability, Research, Trust

The Use of Modernised Technology

Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the globe to communicate and share information. Due to this growing computer technology, the need for an improved network service which involves public accessing […]

Pages: 39 Words: 11796 Topics: Computer Security, Database, Fingerprint, Information Security, Research, Risk, Vulnerability

Traditionally Surveillance was Done Manually

Abstract Surveillance is proving to be very effective technique to ensure the feeling of safety and security among the people of a state. Traditionally surveillance was done manually using human patrolling by police and law maintaining bodies in the city. Then with the advent of CCTVs we started using video surveillance. Though there are many […]

Pages: 33 Words: 10035 Topics: Computer Security, Privacy, Research, Surveillance

Visual Information Encryption

Visual Information Encryption Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. […]

Pages: 46 Words: 13814 Topics: Computer Security, Cryptography, Secrecy

VPN Stands for Virtual Private Network or Virtual Private Networking.

Pop Quiz! VPN stands for… A.1 VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only "virtually" private, however, because this data actually travels over shared public networks instead of […]

Pages: 27 Words: 8194 Topics: Computer Networking, Computer Security, Computer Virus, Linux, Malware, Microsoft Office, Operating System

What is Security Incident?

EXECUTIVE SUMMARY 1INTRODUCTION Expect the unexpected. As soon as a crisis erupts, it should be immediately handled to reduce its potential impact on critical business operations. Such undesirable incidents occur unanticipated and when they do take place, damage or harm is the result. In most aspects of life, it is better to stop something disastrous […]

Pages: 44 Words: 13201 Topics: Computer Security, Cyber Security, Employment, Information, Information Security, Recruitment, Team, Training

Transport Layer Security

The Transport Layer Security Protocol is used to communicate between client-server applications across a network. TLS helps in the communication preventing from the following Tampering, Eavesdropping, Message forgery. TLS provides the authentication at the endpoints and confidentiality over the network using cryptography and also it provides RSA security with 1024 and 2048 bit strengths In […]

Pages: 31 Words: 9428 Topics: Computer Networking, Computer Security, Cyberspace, Digital Technology, Information Technology, Ipv6

Business Communication – Legal and Ethical Issues

Unit 4 – Business Communication Assignment 3 – Legal and Ethical issues Task 4 Data Protection Act 1998 Businesses store information about people inside their organisation. The Data Protection Act protects the information held about people from being misused. The information stored must be: Obtained fairly and lawfully Used only for the purposes stated during […]

Pages: 7 Words: 2003 Topics: Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Data, Information Technology, Privacy

Business Essays – NCipher Management Customer

nCipher Management Customer 1 Introduction 1.1 Background nCipher is a well recognised and respected leader in providing encryption and key management solutions to public and private enterprises and institutions world wide. nCipher help the customers – many of whom are among the world’s most security conscious organisations – to protect and secure their most sensitive […]

Pages: 12 Words: 3688 Topics: Computer Security, Cryptography, Entrepreneurship, Market, Market Segmentation, Retail, Strategic Management

Potential Risks to Organisations Committing to an Ecommerce System

Contents Introduction What is E –Commerce Marketing Your Product Identifying and meeting your customer needs Training of staff Design of the Website Monitoring your website Protecting your website Customer Service: Legislation national and international Conflict with Retailers Bibliography THE POTENTIAL RISK TO ORGANISATIONS COMMITTING TO AN ECOMMERCE SYSTEM Introduction In this report I will discuss […]

Pages: 7 Words: 2117 Topics: Computer Security, Cyber Crime, Cyberspace, Information Technology

Internet Banking System

Internet banking system has become widely popular and used among many consumers. There is much debate as to whether internet banking system is secure. This essay argues that client, data transport and bank’s server are important players in terms of internet banking security. This essay demonstrates some vulnerability of these sections and shows successful solutions. […]

Pages: 10 Words: 3149 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Online Banking, Phishing

Operational Risk has been Often Underestimated Finance Essay

Operational risk has been often underestimated and set aside in relation to other risks by many insurance companies during the past, especially in insurance and banking industry. Nowadays, operational risk has been given more attention, as it has been realized that proper and effective operational risk management can significantly reduce unnecessary operational losses. It can […]

Pages: 20 Words: 6052 Topics: Computer Security, Economy, Risk, Risk Management

Rights to Anonymity in Cyber Crime

INTRODUCTION It is undeniable that in cyber world, everyone is able to create a number of personalities that no one could distinguish whether an identity is reliable or not; or, even leave a hole to cyber crimes to carry on internet frauds using different fake identities. Consequently, this circumstance might lead to much confusion and […]

Pages: 5 Words: 1556 Topics: Accountability, Computer Security, Cyber Crime, Cyber Security, Cyberspace, Government, Information, Transparency
1 2 3
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price