"Network security" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 42 of 50 - About 500 Essays
  • Powerful Essays

    POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK by Major Awal Uddin Ahmed (ID: 1003) Major Md Shariful Islam(ID: 1004) Major K M Hasnut Zamil (ID: 1006) A Project Report submitted to the department of Electrical Electronic and Communication Engineering in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Electrical Electronic and Communication Engineering Advisor: M. Shamim Kaiser Military Institute of Science and Technology Mirpur Cantonment

    Premium Wireless networking Wireless Cognitive radio

    • 9257 Words
    • 38 Pages
    Powerful Essays
  • Good Essays

    Security Concern In SCADA

    • 929 Words
    • 4 Pages

    1.5. Security Concern For any infrastructure or industry the most important part is it’s security. Basically the prime target to secure the industry from physical attack. In electric power industry physical attack is shutdown‚ break down etc. In chemical industry physical attack is leaking of chemical etc. These kind of attacks is known as physical attacks. physical attacks are done by anybody like human error‚ computer system failure. Second type of attack is cyber attacks. Cyber attacks are done

    Premium Security Computer security Information security

    • 929 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Preventing Security Breaches Darleen Busot BIS/221 February 2‚ 2015 James Boykin Preventing Security Breaches The era of the Internet is giving people many tools and advantages that help them been available at any time and place and they are been more productive. It has also helped corporations becoming efficient and increased their exposure to the public. All pros come with cons‚ and the Internet cons are affecting people and corporations as well. People and companies are been exposed to the dark

    Premium Computer security Prevention Computer

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    ABSTRACT WHAT WAS DONE: The issue-specific security policy was the main focus for this research paper. An analysis of the policy itself was conducted and also a set of guidelines were developed that comply with this policy. The components of the policy and how organisations would use them were looked into. The reason for choosing the issue-specific security policy was because it was the least investigated yet potentially the most important policy of all three key policies. The purpose of the

    Premium Information security Policy Security

    • 3522 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    E-Commerce security

    • 1260 Words
    • 6 Pages

    Computer Security and Cyber police Computer security can also be called IT security‚ and Network security. It is a specialized field of IT that involves securing networks‚ preventing unauthorized access‚ and fighting against cyber threats. Today’s most common threats consist of the following: viruses‚ worms‚ spyware‚ adware‚ hacker attacks‚ denial of service attacks‚ data interception and theft‚ and identity theft. Most dangerous once are international cyber-attacks. For example‚ “For almost two

    Premium Police Computer security Security

    • 1260 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Running head: POTENTIAL WEAKNESSES Security Assessment and Recommendations Security Assessment and Recommendations I have been charged with the task of identifying potential security weaknesses and recommending solutions for Quality Web Design (QWD). The project was completed in two phases. The first phase of the project specifically identified and defined two potential security weaknesses: software and policy. The second phase recommends solutions to these potential weaknesses. I chose a

    Premium Virtual private network Computer network Local area network

    • 1470 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    "The Reluctant Security Guard" By: Jennifer Ruddell AIU December 10‚ 2004 In the case of "The Reluctant Security Guard"‚ I do believe that the security guard took the correct action regarding putting drunk drivers out of the mall parking areas onto the highway. I would have‚ in this situation‚ acted in a similar manner as he. By this I mean I would have contacted my superiors and spoke of alternatives other than putting intoxicated drivers on the highway that may cause harm to others as a result

    Premium Security guard Security Surveillance

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    proceedings Security Analysis of Enterprise Network Based on Stochastic Game Nets Model Yuanzhuo Wang‚ Chuang Lin‚ Senior Member‚ IEEE‚ Yang Wang‚ Kun Meng Department of Computer Science and Technology‚ Tsinghua University‚ Beijing 100084‚ China Email: {yzwang‚ clin‚ ywang‚ mengkun08}@csnet1.cs.tsinghua.edu.cn Abstract—In this paper‚ we propose a novel modeling method‚ Stochastic Game Nets (SGN)‚ and use it to model and analyze the security issues in enterprise networks. Firstly‚ the definition

    Premium Nash equilibrium Game theory

    • 4413 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Security Supervisor Role

    • 1252 Words
    • 6 Pages

    the responsibilities implicit in the role of a Security Supervisor. A door supervisor is responsible for checking the suitability of people wanting to enter venues and look after their safety inside the venue. Door supervisors are to control access to the premises‚ checking that no person is underage‚ carrying any harmful substances or objects‚ enforce the law and any company policy or entry conditions such a dress codes‚ ensure the safety and security of clients and other staff‚ both in routine situations

    Premium Management Security Law

    • 1252 Words
    • 6 Pages
    Better Essays
  • Good Essays

    network border patrol

    • 3230 Words
    • 13 Pages

    NETWORK BORDER PATROL PREVENTING CONGESTION COLLAPSE A PROJECT REPORT Submitted by N. SWAMINATHAN (41501104094) A. THENAPPAN (41501104122) in partial fulfillment for the award of the degree of BACHELOR OF ENGINEERING in COMPUTER SCIENCE AND ENGINEERING S.R.M. ENGINEERING COLLEGE‚ KATTANKULATHUR-603 203‚ KANCHEEPURAM DISTRICT. ANNA UNIVERSITY : CHENNAI - 600 025 MAY 2005 1 BONAFIDE CERTIFICATE Certified that this project report "NETWORK BORDER PATROL PREVENTING CONGESTION

    Premium Transmission Control Protocol Control theory Computer network

    • 3230 Words
    • 13 Pages
    Good Essays
Page 1 39 40 41 42 43 44 45 46 50