"Plaintext" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 15 of 24 - About 235 Essays
  • Powerful Essays

    Towson University Applied Information Technology Research Paper Advanced Encryption Standard (AES) Protecting Cloud Computing Healthcare Data Information Technology Infrastructure AIT 600.103 Dr. Raza Hasan Fall 2014 UjwalRai 12-04-14 Abstract Healthcare organizations are tremendously adapting cloud computing system to their organization for storing sensitive information as well as applications. The efficiencies and cost-savings made possible by cloud environments directly

    Premium Cloud computing

    • 2415 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    E-Voting by Using Biometrics

    • 2584 Words
    • 11 Pages

    Majan College MSC. In Computer Science Secure Data Communication E-Voting by using biometrics Study of using Fingerprints and Iris in e-voting Presented by: Muna Al-Busaidi. Student ID:1032796 Presented to: Mr.Ramalingam D. Answer for question (1) section (A): Introduction Biometrics is a technique to verify identity based on the unique physiological characteristic (physical and behavior) of human body such as finger print‚ iris‚ voice‚ DNA‚ face and signature‚ that can be identified

    Premium Biometrics

    • 2584 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Cardless Atm

    • 2555 Words
    • 11 Pages

    CARDLESS ATM “You are the Cash card” ABSTRACT: Over the past three decades‚ consumers have been largely depending on and trust the Automatic Teller Machine (ATM) to conveniently meet their banking needs. However‚ despite the numerous advantages of ATM system‚ ATM fraud has recently become more widespread. In this paper‚ we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds

    Premium Automated teller machine

    • 2555 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Discovering Computers 2008 Chapter 9 Computer Security‚ Ethics and Privacy 1 2 Chapter 10 Objectives Describe the types of computer security risks Discuss the types of devices available that protect computers from system failure Identify ways to safeguard against computer viruses‚ worms‚ Trojan horses‚ botnets‚ denial of service attacks‚ back doors‚ and spoofing Explain the options available for backing up computer resources Discuss techniques to prevent unauthorized computer access and use

    Premium E-mail Internet Computer virus

    • 2181 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Management

    • 2133 Words
    • 29 Pages

    size Question 2 0 out of 2 points With PGP‚ you send the private key to ____. Selected Answer: people whom you have authorized to send you encrypted messages Answers: people whom you have authorized to send you plaintext messages people whom you have authorized to send you encrypted messages anyone with whom you expect to have e-mail correspondence no one Question 3 2 out of 2 points Most wireless networks transport data as ____ signals

    Premium Personal computer Computer Operating system

    • 2133 Words
    • 29 Pages
    Good Essays
  • Good Essays

    Mascara

    • 2411 Words
    • 10 Pages

    Mobile financial services‚ also referred to as mobile money‚ mobile payment‚ mobile banking‚ mobilemoney transfer and mobile wallet generally refer to payment services operated under financial regulationand performe from or via a mobile device. Although financial institutions and credit cardcompanies have implemented solutions [1] that provide mobile access to their services‚ in 2011‚ a number ofmobile communication companies‚ such as mobile network operators‚ major telecommunications infrastructure and handset multinationals such

    Premium Mobile phone Mobile network operator

    • 2411 Words
    • 10 Pages
    Good Essays
  • Best Essays

    Security Issues with Databases by Jing Ji David Maccarone Sheng Mao Security Issues with Databases 1. Current state of database security A database is a system that is specialized to manage data in a computer application system. Data has many forms‚ such as text‚ digital‚ symbols‚ graphics‚ images and sound. The database systems are integral components of current and future command‚ communication‚ control and intelligence information systems. (Lunt‚ 1992‚ p. 253) Databases

    Premium SQL Database Database management system

    • 2529 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    ABSTRACT Transferring vital information securely without any threat of intrusion is extremely important. Crypography and steganography‚ both provide security to messages. But‚ it would be best if both of these are combined and provide a high-level of security. Cryptography only scrambles a message into a form which can’t be understood whereas steganography hides the information in a vessel like Image‚ Audio or Video. In this Paper‚ a combination of four techniques is done to analyze the level of

    Premium Security Computer security Information security

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Pwdhash

    • 9759 Words
    • 40 Pages

    that transparently produces a different password for each site‚ improving web password security and defending against password phishing and other attacks. Since the browser extension applies a cryptographic hash function to a combination of the plaintext password entered by the user‚ data associated with the web site‚ and (optionally) a private salt stored on the client machine‚ theft of the password received at one site will not yield a password that is useful at another site. While the scheme requires

    Premium Internet Explorer Password Mozilla Firefox

    • 9759 Words
    • 40 Pages
    Powerful Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    There is nothing more important in any business than securing your network topology from hardware‚ design and software. This plan is called network hardening and this plan needs to be incredibly detailed with how the network will be secured in each area. The first step to the network hardening plan resides in how you will build the network and then from there how you will secure each section of the network. This paper will discuss access control measures‚ encryption‚ PKI‚ certificates‚ OS hardening

    Free Transport Layer Security Certificate authority Public key infrastructure

    • 2847 Words
    • 12 Pages
    Better Essays
Page 1 12 13 14 15 16 17 18 19 24