"Information security" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 38 of 50 - About 500 Essays
  • Powerful Essays

    2007 189 Business Risks and Security Assessment for Mobile Devices PATRICIA MAYER MILLIGAN Information Systems Department Baylor University Waco‚ Texas USA pati_milligan http://business.baylor.edu/pati_milligan/ DONNA HUTCHESON Director of It Audit TXU Corporation Dallas‚ Texas USA dhutche1 http://www.txu.com Abstract: - Technology advances over the past decade have elevated business risk from mobile devices to an unparalleled high. The relationships between security‚ business risks‚ and their corresponding

    Premium Computer security Information security Security

    • 2564 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce Author(s): Bomil Suh and Ingoo Han Reviewed work(s): Source: International Journal of Electronic Commerce‚ Vol. 7‚ No. 3 (Spring‚ 2003)‚ pp. 135161 Published by: M.E. Sharpe‚ Inc. Stable URL: http://www.jstor.org/stable/27751068 . Accessed: 09/12/2012 05:40 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use‚ available at . http://www.jstor.org/page/info/about/policies/terms

    Premium Security Electronic commerce Computer security

    • 11098 Words
    • 45 Pages
    Good Essays
  • Good Essays

    Physical Security Principles Paula L. Jackson CJA/585 June 7‚ 2010 Professor Brian Kissinger Abstract Physical safety inside and out depends on the type of physical security that is being used by that facility. How well the buildings security system is being implemented can have an impact on the safety of its patrons and other individuals who frequent the building. Physical Security Principles Safety in numbers has always been a deterrent method when leaving or traveling

    Premium Security Physical security Access control

    • 950 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Linux Security

    • 7689 Words
    • 31 Pages

    Contents 1. Introduction 1 1.1 Problem Statement 1 1.2 What Is Security? 1 1.3 OS Protection and Security 2 1.4 Assets and their Vulnerabilities 2 1.5 Protection 3 1.6 Intruders 3 1.7 Malicious Software 3 1.8 Trusted Systems 4 1.9 Protection and Security Design Principles 4 1.10 The Unix/Linux Security Model 5 1.10.1 Properties of the Unix Superuser 5 1.10.2 The Unix Security Model — Groups 6 1.10.3 Protection For Unix Files and Directories 6 1.10.4 The Meaning of Permissions 6

    Premium Access control Computer security

    • 7689 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    Mobile Security

    • 3398 Words
    • 14 Pages

    most crucial subject for information security. The password based authentication is weak solution and no longer adequate. User select static password which is easy to guess and remember‚ relevant information or common for all authentication process. This simplicity makes weak authentication scheme; as so far‚ static passwords are known as easiest target for attackers. Further‚ Security Token based runtime interaction could extend the strength of authentication control. Security tokens can be used for

    Premium Authentication Password

    • 3398 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Assignment 4 iPad’s Security Breach Bus 508 Business Enterprise February 28‚ 2011 iPad’s Security Breach Goatse Security Objective Discuss Goatse Security firm possible objectives when they hacked into AT&T’s Website. Goatse Security firm had two primary objectives when they hacked into AT&T’s website‚ was for exposure and security. Goatse was able to exposed AT&T security was not in the top-notch conditions that many people would have thought that a company of that worth

    Premium Computer security Security Risk

    • 387 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Project: Network Security Plan Chris Wiginton‚ Jose Rosado ITT Technical Institute‚ Tampa FL Instructor: Sherman Moody 18 November‚ 2014 Network Security Plan INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission‚ operation‚ and reputation of Corporation Tech System and its information systems. These

    Premium Security Information security Computer security

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Information Superiority

    • 1032 Words
    • 5 Pages

    Information Superiority CPT Woodrow Anderson CAX Class 757 Information Superiority 1 Purpose To present the concept of information superiority and the drivers of success Information Superiority 2 References • FM 3-0‚ June 2001‚ Operations • FM 100-6‚ August 1996‚ Information Operations • Joint Publication (JP) 3-13‚ 13 February 2006‚ Information Operations • National Security Strategy‚ September 2002 • Joint Vision 2020 • Exploring Information Superiority‚ 2004 • Defense Information

    Premium Enron 2001 Kenneth Lay

    • 1032 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Network Security

    • 4030 Words
    • 17 Pages

    source of information exchange for all types of businesses. Different technologies are used within the context of networking depending on the requirements of an organization. Ethernet is off course the best technology for the “local area network” (LAN)‚ but when the organization spread their business to much longer distances (cities) then WAN technologies need to be deployed to keep the business running. The selection of an appropriate WAN technology that can ensure efficiency and security of the business

    Premium Computer network Virtual private network Wi-Fi

    • 4030 Words
    • 17 Pages
    Best Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Computer Security Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user‚ and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information‚ possessed objects‚ and biometric devices. With remembered information‚ a user

    Free Authentication Password Computer security

    • 414 Words
    • 2 Pages
    Good Essays
Page 1 35 36 37 38 39 40 41 42 50