"Theoretical framework in network security research" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 29 of 50 - About 500 Essays
  • Satisfactory Essays

    Security

    • 257 Words
    • 2 Pages

    Defining National Security VS Personal Privacy is a matter of looking at the basic nature of each. From research collected there is a consensus that we need balance. Too much of one hurts the other and vise versa. There are a couple of articles that range from Civil Liberties to the birth of public right to know that support the overall claim. Talks about the effects of censorship in different situations like war and peace will help prove that a balance needs to be forged. The problem here

    Premium Civil liberties Human rights

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NEURAL NETWORK

    • 2214 Words
    • 9 Pages

    TIME POWER SYSTEM SECURITY ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS REAL TIME POWER SYSTEM SECURITY ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS Abstract Contingency analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. The traditional approach of security analysis known as exhaustive security analysis involving

    Premium Artificial neural network Neural network

    • 2214 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Acceptable Use Policy Security monitoring controls for intrusion Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping‚ probing‚ and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring‚ scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering

    Premium Internet

    • 313 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Threats

    • 924 Words
    • 4 Pages

    the research paper is to illustrate most common network threats and provide solution to protect users from threats‚ hackers and ensures that the data travelling across the networks is safe. Introduction: Computer and network security is a new and fast moving Technology and as such‚ is still being defined and most probably will always be “still defined”. Security incidents are rising at an alarming rate every year [Figure - 1]. As the complexity of the threats increases‚ so do the security measures

    Premium Computer security Attack Computer network

    • 924 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Wealth of Networks

    • 223681 Words
    • 895 Pages

    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 1 # 1 The Wealth of Networks 1 0 1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 2 # 2 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London 1 0 1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg

    Premium Economics

    • 223681 Words
    • 895 Pages
    Powerful Essays
  • Powerful Essays

    Android Hacking and Security Donna McDuffey Kentucky State University Graduate Student Nicholasville‚ KY 859-382-3480 donna.mcduffey@kysu.edu ABSTRACT An introduction to the security risks to android users‚ how hackers target these platform devices‚ and how users can better protect themselves and sensitive data. Categories and Subject Descriptors Introduction Android Platform introduction Android Security Features and Shortcomings Types of Android Hacking Android Security Measures to Prevent

    Premium Mobile operating system Smartphone Android

    • 1705 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Content……………………………………………………......................................2 1. Introduction ………………………………………………………………..........3 2. Chapter 1 1. Theoretical problems of terminology………………………………………..…..6 1.1 Terms‚ their definition and classification 1.2 Terminology 3. Chapter 2 Semantic peculiarities of English and Ukrainian medical terminology ……………………………….................................................................................15 4. Conclusions……………………………………………….....

    Premium Linguistics

    • 3661 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Conceptual Framework

    • 1875 Words
    • 8 Pages

    Before conceptual framework is formed‚ companies prepared their financial report by their own methods. As to increase the utility of the financial report to the users for making economic decisions‚ conceptual framework is begun to develop by various professional bodies and organizations. 2. DEVELOPMENT OF CONCEPTUAL FRAMEWORK In 1970s‚ Financial Accounting Standards Board (‘FASB’) of United States began to develop a conceptual framework. The FASB defined the conceptual framework as a “…constitution

    Premium Financial statements International Financial Reporting Standards Balance sheet

    • 1875 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Network Management

    • 1918 Words
    • 8 Pages

    Network management incorporates an almost unlimited list of duties—basically‚ doing whatever it takes to keep the network running smoothing and efficiently‚ with minimal or no downtime. Network Management  Network Management defined as 1. 2. 3. 4.      Network management is more than just managing networks. Network management is presented from the perspectives of service management‚ operations support systems‚ and business management. The platform for a network management

    Premium

    • 1918 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Virtual Network

    • 4865 Words
    • 20 Pages

    Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19‚ 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future

    Premium Virtual private network

    • 4865 Words
    • 20 Pages
    Powerful Essays
Page 1 26 27 28 29 30 31 32 33 50