Information security Essays

Filter filter
Sort by filter
45 essay samples is found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

Data Segregation and Recovery

Introduction: Cloud Computing refers to the conveyance of applications as benefits over the web. It likewise incorporates the hardware and the framework programming in the data centers which give those services (Armburst and Fox, 2010). It builds the usage of the assets. So clients simply need to pay to the cloud specialist co-op. It takes […]

Pages: 10 Words: 2995 Topics: Cloud Computing, Computer Networking, Digital Technology, Information Security, Information Technology, Segregation

Career Path Interview

1.If you are currently employed is it in your desired career?If you are not currently working what is your desired career? A: I am currently working as a Web Developer.Well, that is one of my desired designation in my career.I wanted to gain strong hands-on with Web Applications development which helps in working on tricky […]

Pages: 2 Words: 674 Topics: Career Path, Information Security, Learning
Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

Electronic commerce (e-commerce)

Task: 01 Solar Power at Home provides information on alternative energy options for homeowners. Common sense home solar system tips, keeping costs down and collecting free, passive solar power for homes. Over the years we’ve waded through a lot of technical talk as we completely outfitted our living quarters with solar energy. Using solar energy […]

Pages: 11 Words: 3291 Topics: Information Security, Solar Power, Supply Chain

Business Group Report – Australian Hardware

Business Report The type of existing business of my choice is hardware firm used to work in Melbourne by the name of Australian Hardware. Its first store opened in 1921 in Sydney. It was famous for making different type of small households as well as furniture. After getting fame by people, the business was expanded […]

Pages: 7 Words: 2025 Topics: Cloud Computing, Employment, Information, Information Security, Information Technology

Internet banking

ABSTRACT Internet banking started in 80s and nowadays it’s considered globally as an essential need of today’s modern banking facilities. The debate about moving secure investment and banking transaction to the web is indeed over because they are already in progress but analysis of the dimensions of this revolution are far from complete. This research […]

Pages: 51 Words: 15430 Topics: Bank, Information Security, Internet Privacy, Online Banking, Phishing, Research, Trust

What is security incident?

EXECUTIVE SUMMARY 1INTRODUCTION Expect the unexpected. As soon as a crisis erupts, it should be immediately handled to reduce its potential impact on critical business operations. Such undesirable incidents occur unanticipated and when they do take place, damage or harm is the result. In most aspects of life, it is better to stop something disastrous […]

Pages: 44 Words: 13201 Topics: Computer Security, Cyber Security, Employment, Information, Information Security, Recruitment, Team, Training

Voice over Internet Protocol

ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephony’s system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a day’s many industries will use the VoIP technologies to provide the Security. In […]

Pages: 44 Words: 13268 Topics: Computer Networking, Cyberspace, Digital Technology, Electronics, Information Security, Information Technology, Telephone

The use of modernised technology

Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the globe to communicate and share information. Due to this growing computer technology, the need for an improved network service which involves public accessing […]

Pages: 39 Words: 11796 Topics: Computer Security, Database, Fingerprint, Information Security, Research, Risk, Vulnerability

Sniffing Attacks

Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN) ABSTRACT During the past era, Information Technology made a revolution in R&D. No doubt Internet becomes an essential backbone for all sciences and research nowadays. Accordingly security threats and data banks attacks turn out to be a […]

Pages: 42 Words: 12742 Topics: Computer Networking, Cyberspace, Digital Technology, Information Security

School of engineering & design

Chapter 1: Introduction Autonomic wireless access systems was a model created in order to support the development of communication networks in the direction of efficient flexibility and extensibility to a large sort of potential faults and attacks. On the other hand, particular importance is given on the foundation values to accomplish focused behaviour over a […]

Pages: 34 Words: 10349 Topics: Computer Engineering, Computer Networking, Cryptography, Digital Technology, Information, Information Security, School

Risk Management both

Chapter 1 Introduction Overview Detailed study has been started to understand Risk Management both conceptually and as a process on its own comprising on several stages, tasks and responsibilities. A series of interviews has been performed with an Information System Support Analyst working within the IT industry in order to identify key aspects of Organisational […]

Pages: 29 Words: 8691 Topics: Data Analysis, Information, Information Security, Research, Risk Assessment, Risk Management, Strategic Management

Network Application Wireless

1. Introduction These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectively failure, diagnosing network slow performance and identify source of incident in order to make the network available 24 hours seven days a week. 1.1 Benefits of Network Management Tools […]

Pages: 20 Words: 6089 Topics: Communication, Computer Networking, Digital Technology, Information Security, Information Technology, Ipv6

Mobile Sensor Networks

FAULT TOLERANT SECURE ROUTING IN CLUSTER BASED MOBILE SENSOR NETWORKS Abstract Networks of low power wireless devices have introduced novel routing issues. These devices, such as sensors, smart objects, and actuators have different limitations, such as limited memory, little processing power, and extensive sleep periods. The fact that these devices are battery-powered makes the energy […]

Pages: 50 Words: 14965 Topics: Computer Networking, Digital Technology, Information Security

Impact of IT on Bank’s Performance

IMPACT OF INTERNET TECHNOLOGY ON BANK’S PERFORMANCE AND CUSTOMER’S SATISFACTION ABSTRACT Internet technology is very popular and has many benefits for the users; however it does has some elements of security risks to the bank and its customers at large. In this research work, I intend to look at impact of internet technology on Bank, […]

Pages: 44 Words: 13338 Topics: Bank, Computer Networking, Computer Security, Credit Card, Fraud, Identity Theft, Information Security

Honeypot and Honeynet

Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and they operate on these rules. That is why anomaly detection is limited only to the […]

Pages: 31 Words: 9337 Topics: Computer Engineering, Computer Networking, Cyber Crime, Information Security, Information Technology, Linux, Network, Operating System

Generic access method for network resources

Abstract We are living in the communication era. The communication technology is growing at a fast pace. From the market survey, it has been shown that the fastest growing demand in the market was for electronics items in the past before 1990s. After the introduction of the mobile technology in the market, the demand for […]

Pages: 42 Words: 12518 Topics: Communication, Computer Networking, Computer Security, Cyberspace, Information Security, Information Technology, Network

Environment Network Business

Chapter 3. The Technological Environment Abstract The enterprise network is probably the most fundamental IT service. To successfully operate the network and meet changing business requirements, it’s imperative to understand trends and technology maturity to separate hype from reality and to deploy appropriate technology, correctly timed. Communication is required for organizations to function, yet costs […]

Pages: 46 Words: 13706 Topics: Computer Engineering, Computer Networking, Database, Information Security, Information Technology, Ipv6

Devices and services

Abstract Autonomic networks attempt to find the method to improve the capability of networks, devices and services, in order to handle with unpredictable changes. This document will propose an autonomic solution along with the required components in order to set up an autonomic configuration to a non-centralized and self-administrative group of autonomic base stations taking […]

Pages: 30 Words: 8978 Topics: Communication, Computer Engineering, Computer Networking, Digital Technology, Information Security

Card Security For Republic Bank Customers

There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continues to plague the banking and retail industries as there seems to be no feasible solution to these […]

Pages: 23 Words: 6808 Topics: Banking, Credit Card, Information Security, Research

Security on Social Media

Social networking has a lot of threats to them over these past few years. A lot of these sites like Facebook deal with security issues on their websites. In their research paper Schaik, Jansen, Onibokun, Camp, & Kusev (2018), examined the security threats that is on social networks. When people share online there will always […]

Pages: 4 Words: 1056 Topics: Cyber Bullying, Cyberspace, Facebook, Information Security, Privacy, Risk, Social Media

Types of Supply Chain Risk

Introduction There have been many different definitions of supply chain risk, but it can be broadly defined as “the variation in the distribution of possible supply chain outcomes, their likelihood, and their subjective values” (March & Shapira, 1987, p. 1404). However, this definition has since been expanded upon to account for all the different departments […]

Pages: 8 Words: 2408 Topics: Economy, Information Security, Risk, Risk Management, Supply Chain

Management Challenges Posed By the Role of Information Systems in Organisations

Management Challenges Posed By the Role of Information Systems in Organisations Throughout the 20th century, businesses thrived by making their production methods more and more efficient by improving production processes and developing better ways for making things. However, efficiency in production methods is no longer the only success factors in today’s business world. The excellence […]

Pages: 8 Words: 2466 Topics: Economy, Information, Information Security, Information Technology, Risk

Levels Of Satisfaction When Using E Banking Systems Finance Essay

In the business industry, information technology is changing the way business is conducted. New business models are taking the place of traditional model and organizations are reconsidering business process designs and customer relationship management strategies. In a competitive sector like the banking industry banks are keeping up with technology revaluation and transformation in the banking […]

Pages: 16 Words: 4804 Topics: Bank, Hypothesis, Information Security, Online Banking, Privacy, Research, Risk

Implementing Sarbanes-Oxley

Implementing Sarbanes-Oxley within an Environment: Understanding the controls used to implement Sarbanes-Oxley within an environment Recent high-profile corporate scandals (Enron, WorldCom, Tyco and Arthur Andersen etc.) have shattered the trust, of shareholders, legislators and authorities, in major publicly traded companies and have raised concerns for the state of corporate governance, not only in the United […]

Pages: 16 Words: 4948 Topics: Financial Statement, Information Security, Research, Risk Management

Demonstrate And Critically Analyse The Risk Management Process Finance Essay

ABSTRACT Today, it’s become difficult to protect financial organisations from risks. It harms the organisation in different ways like damaging assets, information or data. It can be in any organisation whether it relates to Business, Finance, or IT. Therefore to handle risk companies use Information Risk management. It is the process of managing risks and […]

Pages: 9 Words: 2794 Topics: Bank, Economy, Information, Information Security, Risk Management

Web Technologies Enterprises

Executive Summary – This paper is divided into two parts. The first part is summarized the content of seminar 2 about “Web 2.0 and the Enterprise”. The speaker: Mr. Lionel Louie is director of Fusion Middleware solutions for Oracle Greater China. The seminar is structured in a way that helps participants to understand the view […]

Pages: 6 Words: 1940 Topics: Blog, Cyberspace, Digital Media, Information Security, Innovation, Malware, Wikipedia

Loyalty Cards As a Method Of Making Shoppers Go To One Supermarket

Section A: Loyalty cards as a method of making shoppers go to one supermarket In addition to gaining customer information, marketing the company, developing relationship with its customers, the ultimate objective of loyalty cards is to retain customer loyalty to drive repeat purchases. Hence, through development of loyalty schemes, the marketers / retail companies etc. […]

Pages: 3 Words: 1015 Topics: Brand, Information Security, Information Technology, Retail

The importance of data and related management issues

Abstract In this module we will discuss the importance of data and the management issues that relate to it, and its life cycle. We will also focus on document management system, discuss the details of data warehousing, data mining, analytical processing and knowledge management. We will also discuss about transaction and analytic processing systems. We […]

Pages: 6 Words: 1732 Topics: Computer Networking, Computer Virus, Digital Technology, Information Security, Information Technology, Malware, Software

Security risks in protecting an organization’s assets

The protection of an organisation’s assets must be based on understanding security risks – the only way an effective security solution / services can be found and implemented is by carrying out a comprehensive security risk assessment and security audit, ‘discuss’. In this paper, the importance of security risk assessments and security audits to an […]

Pages: 6 Words: 1668 Topics: Information Security, Risk Assessment, Risk, Risk Management, Vulnerability

Sarbanes-Oxley Act

Implementing Sarbanes-Oxley within an Environment: Understanding the controls used to implement Sarbanes-Oxley within an environment Recent high-profile corporate scandals (Enron, WorldCom, Tyco and Arthur Andersen etc.) have shattered the trust, of shareholders, legislators and authorities, in major publicly traded companies and have raised concerns for the state of corporate governance, not only in the United […]

Pages: 16 Words: 4948 Topics: Financial Statement, Information Security, Research, Risk Management
1 2