Information security Essays

Filter filter
Sort by filter
45 essay samples is found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

Providing Location-aware End-to-end Data Security in Wireless Sensor Networks

Chapter 1: Introduction Research Method Research is defined as search for new knowledge or an art of scientific and careful investigation of new facts. Research method is referred as a systematic methodology of defining and re-defining the problems, suggest solutions, formulate hypothesis, evaluate the data, make deductions and then reach conclusions. At last, test the […]

Pages: 59 Words: 17608 Topics: Computer Networking, Cryptography, Data Analysis, Information Security, Java, Research, Swing

Reliable Data Transmission over Wireless Network

CHAPTER – 1 INTRODUCTION TO THE STUDY 1.1 INTRODUCTION TO THE PROBLEM This report specifies the wireless secured communication in an enterprise when there is increasing demand of ubiquitous multimedia data services, future wireless networks are expected to provide services with wider coverage area, reliable and higher data throughput with security. To acheive these goals, […]

Pages: 54 Words: 16264 Topics: Communication, Computer Networking, Digital Technology, Electronics, Information Security
Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

Incident Handling on Cloud Computing

Incident Handling on Cloud Computing Introduction Cloud Computing Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites.As cloud computing allocate the divided possessions by means of the systems in the released surroundings. That’s why it creates the safety issues for us to expand the cloud […]

Pages: 51 Words: 15358 Topics: Cloud Computing, Computer, Information Security, Malware, Software, Vulnerability

Evolution of Smart Homes

I. Introduction Smart homes, the next gigantic leap in the field of home automation, have become an emerging research field in last few decades. Research on smart homes has been gradually moving towards application of ubiquitous computing, tackling issues on device heterogeneity and interoperability. A smart home adjusts its function to the inhabitant’s need according […]

Pages: 31 Words: 9184 Topics: Automation, Information, Information Security, Machine Learning

Incident Handling with Cloud Computing Security

Incident Handling on Cloud Computing Introduction Cloud Computing Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. As cloud computing allocate the divided possessions by means of the systems in the released surroundings. That’s why it creates the safety issues for us to expand the […]

Pages: 52 Words: 15471 Topics: Cloud Computing, Computer, Cryptography, Information Security, Malware, Vulnerability

Password Management Security System

Project Aim: Passwords management is an important aspect of computer security, it’s the front line of protection for user terminals and it is by far the most common user authentication method within the largest multinational organizations. A poorly chosen password will increase the probability for an information system to be compromised. As such, all organization […]

Pages: 34 Words: 10165 Topics: Computer Security, Crime Prevention, Cryptography, Information Security, Malware, Operating System

The Form of Choice

1. Introduction Voting is understood to be the form of choice. This form of expression can be performed through the ballot, or by any other electoral schemes. The electronic voting is a way in which votes cast by voters of a specific electronic medium that can be retrieved, tallied and stored electronically. The project to […]

Pages: 54 Words: 16219 Topics: Computer Networking, Computer Virus, Election, Information Security, Malware, Voter Turnout, Voting

The Security Management

The Security Management Industry INTRODUCTION Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate security products. Security management is a broad term that encompasses several currently distinct market segments. With the presence of the Internet, spam is becoming increasingly costly and dangerous as spammers deliver […]

Pages: 27 Words: 8172 Topics: Competitive Advantage, Computer Security, Information Security, Innovation, Malware, Organizational Culture, Strategic Management

The Three Main Concepts

1 Incident Prioritization This chapter precisely gives introduction to the three main concepts that support the incident prioritization such as the related work to incident prioritization, understanding risk and some methods for prioritization using decision theories. Section 3.1 introduces definition for some terminology used in the chapters and continues with the detail of the methods […]

Pages: 33 Words: 9831 Topics: Information Security, Quantitative Research, Risk Assessment, Risk, Risk Management, Time Management, Vulnerability

Internet Banking Errors

Strategies to gain new customers via internet banking 1. Introduction It includes the following topics: a. A clear statement of the purpose of the thesis b. Reasons for the study c. Statement of problems d. Purpose of the study a. The purpose of the thesis: If students have to write their M.B.A theses, which make […]

Pages: 41 Words: 12421 Topics: Bank, Digital Marketing, Information Security, Online Banking, Retail, Risk Management, Strategic Management

Computer Network Data | Information Systems Dissertations

Networking and Management Introduction A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include devices like printers and other resources like electronic mail, internet access, and file sharing. A computer network can also be seen as a collection of Personal computers and […]

Pages: 15 Words: 4422 Topics: Computer Networking, Digital Technology, Information Security, Information Technology

Computers Security Business | Information Systems Dissertations

Introduction While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside […]

Pages: 39 Words: 11616 Topics: Computer Networking, Computer Security, Cyber Security, Database, Information Security, Malware, Risk, Risk Management

Information Systems Dissertations: Critically Analyse the Efficiency of it

  Critical Research Analysis On The Effectiveness Of IT Auditing For Corporate Governance Chapter 1: Introduction 1.1 Introduction Auditing is one of the essential elements for the successful functioning of the business and helps an organization to face the external world with precise information on its business and issues related to accountability. Also, it is […]

Pages: 64 Words: 19303 Topics: Bank, Financial Statement, Fraud, Information, Information Security, Organization, Research

Risk Management Business | Information Systems Dissertations

Software Project Management (CI6113) Title: Reviewing the Past Research Papers on Risk Management Abstract Risk Management is nowadays the important research topic in the many critical business areas and industrial areas. Project teams do not achieve their projects goals of reducing cost and gaining much profit without assessing risks and managing risks. This term paper […]

Pages: 21 Words: 6213 Topics: Data Analysis, Database, Information Security, Learning, Project Management, Research, Risk Management

Card Security for Republic Bank Customers

There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continues to plague the banking and retail industries as there seems to be no feasible solution to these […]

Pages: 23 Words: 6808 Topics: Banking, Credit Card, Information Security, Research

Devices and Services

Abstract Autonomic networks attempt to find the method to improve the capability of networks, devices and services, in order to handle with unpredictable changes. This document will propose an autonomic solution along with the required components in order to set up an autonomic configuration to a non-centralized and self-administrative group of autonomic base stations taking […]

Pages: 30 Words: 8978 Topics: Communication, Computer Engineering, Computer Networking, Digital Technology, Information Security

Environment Network Business

Chapter 3. The Technological Environment Abstract The enterprise network is probably the most fundamental IT service. To successfully operate the network and meet changing business requirements, it’s imperative to understand trends and technology maturity to separate hype from reality and to deploy appropriate technology, correctly timed. Communication is required for organizations to function, yet costs […]

Pages: 46 Words: 13706 Topics: Computer Engineering, Computer Networking, Database, Information Security, Information Technology, Ipv6

Generic Access Method for Network Resources

Abstract We are living in the communication era. The communication technology is growing at a fast pace. From the market survey, it has been shown that the fastest growing demand in the market was for electronics items in the past before 1990s. After the introduction of the mobile technology in the market, the demand for […]

Pages: 42 Words: 12518 Topics: Communication, Computer Networking, Computer Security, Cyberspace, Information Security, Information Technology, Network

Honeypot and Honeynet

Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and they operate on these rules. That is why anomaly detection is limited only to the […]

Pages: 31 Words: 9337 Topics: Computer Engineering, Computer Networking, Cyber Crime, Information Security, Information Technology, Linux, Network, Operating System

Impact of it on Bank’s Performance

IMPACT OF INTERNET TECHNOLOGY ON BANK’S PERFORMANCE AND CUSTOMER’S SATISFACTION ABSTRACT Internet technology is very popular and has many benefits for the users; however it does has some elements of security risks to the bank and its customers at large. In this research work, I intend to look at impact of internet technology on Bank, […]

Pages: 44 Words: 13338 Topics: Bank, Computer Networking, Computer Security, Credit Card, Fraud, Identity Theft, Information Security

Mobile Sensor Networks

FAULT TOLERANT SECURE ROUTING IN CLUSTER BASED MOBILE SENSOR NETWORKS Abstract Networks of low power wireless devices have introduced novel routing issues. These devices, such as sensors, smart objects, and actuators have different limitations, such as limited memory, little processing power, and extensive sleep periods. The fact that these devices are battery-powered makes the energy […]

Pages: 50 Words: 14965 Topics: Computer Networking, Digital Technology, Information Security

Network Application Wireless

1. Introduction These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectively failure, diagnosing network slow performance and identify source of incident in order to make the network available 24 hours seven days a week. 1.1 Benefits of Network Management Tools […]

Pages: 20 Words: 6089 Topics: Communication, Computer Networking, Digital Technology, Information Security, Information Technology, Ipv6

Risk Management both

Chapter 1 Introduction Overview Detailed study has been started to understand Risk Management both conceptually and as a process on its own comprising on several stages, tasks and responsibilities. A series of interviews has been performed with an Information System Support Analyst working within the IT industry in order to identify key aspects of Organisational […]

Pages: 29 Words: 8691 Topics: Data Analysis, Information, Information Security, Research, Risk Assessment, Risk Management, Strategic Management

School of Engineering & Design

Chapter 1: Introduction Autonomic wireless access systems was a model created in order to support the development of communication networks in the direction of efficient flexibility and extensibility to a large sort of potential faults and attacks. On the other hand, particular importance is given on the foundation values to accomplish focused behaviour over a […]

Pages: 34 Words: 10349 Topics: Computer Engineering, Computer Networking, Cryptography, Digital Technology, Information, Information Security, School

Sniffing Attacks

Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN) ABSTRACT During the past era, Information Technology made a revolution in R&D. No doubt Internet becomes an essential backbone for all sciences and research nowadays. Accordingly security threats and data banks attacks turn out to be a […]

Pages: 42 Words: 12742 Topics: Computer Networking, Cyberspace, Digital Technology, Information Security

The Use of Modernised Technology

Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the globe to communicate and share information. Due to this growing computer technology, the need for an improved network service which involves public accessing […]

Pages: 39 Words: 11796 Topics: Computer Security, Database, Fingerprint, Information Security, Research, Risk, Vulnerability

Voice over Internet Protocol

ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephony’s system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a day’s many industries will use the VoIP technologies to provide the Security. In […]

Pages: 44 Words: 13268 Topics: Computer Networking, Cyberspace, Digital Technology, Electronics, Information Security, Information Technology, Telephone

What is Security Incident?

EXECUTIVE SUMMARY 1INTRODUCTION Expect the unexpected. As soon as a crisis erupts, it should be immediately handled to reduce its potential impact on critical business operations. Such undesirable incidents occur unanticipated and when they do take place, damage or harm is the result. In most aspects of life, it is better to stop something disastrous […]

Pages: 44 Words: 13201 Topics: Computer Security, Cyber Security, Employment, Information, Information Security, Recruitment, Team, Training

Internet Banking

ABSTRACT Internet banking started in 80s and nowadays it’s considered globally as an essential need of today’s modern banking facilities. The debate about moving secure investment and banking transaction to the web is indeed over because they are already in progress but analysis of the dimensions of this revolution are far from complete. This research […]

Pages: 51 Words: 15430 Topics: Bank, Information Security, Internet Privacy, Online Banking, Phishing, Research, Trust

Business Group Report – Australian Hardware

Business Report The type of existing business of my choice is hardware firm used to work in Melbourne by the name of Australian Hardware. Its first store opened in 1921 in Sydney. It was famous for making different type of small households as well as furniture. After getting fame by people, the business was expanded […]

Pages: 7 Words: 2025 Topics: Cloud Computing, Employment, Information, Information Security, Information Technology
1 2
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price