Chapter 2 Security and Encryption Introduction the process of preventing and detecting unauthorized using of your computer is called Computer security, prevention help to stop unauthorized users (also known as "intruder") from accessing computer system, detection determine where if someone attempted to break into system or not. Network security is the proper safeguarding of all components associated with a network. Security involves the various measures to protect network's components and resource from various threats including physical (e.g., natural disaster, sabotage) and illegitimate users. In generally, security is similar to safety, Security is the condition of being protected against danger and loss [9]. Security issues associated with co-operative routing in multi-hop wireless networks they are as follows [12]: • Confidentiality: The confidentiality property refers to limiting unauthorized access to sensitive information.
Upon the inception of telecommunications there has always been an attempt to break boundaries and set higher standards. Going from morse code, the voice communication then finally mobile phones, the evolution of the ease of worldwide communication is indisputable. Of course with the upgrade of hardware, there must be an upgrade in software. Smartphones are undoublty one of the most influential, and important inventions of the modern world, they have influenced the way the world functions so much that we, as a species, would probably collapse without them. The most pivotal thing to derive from the smartphone is without a doubt, text messaging.
Setting file permissions is a form of DAC because it is the owner’s discretion. Configuring as many security layers as the user can will ensure the server will stay secure. Not all OS are 100% secure, but they can be configured to make it very hard for a hacker to
Data is the raw form of information stored in our databases, network servers, and personal computers. This might be a wide range of information from personnel files and intellectual property to market analytics and details intended to top secret. However, some of this information not planned to leave the system. The unauthorized admission of the data will cause to several problems for
Introduction There have been numerous information technology advances which have revolutionized the management and running of organizations. It is important that these technologies and automated systems are protected from intrusion, interference, and manipulation by unauthorized parties. This is because it could be disastrous if sensitive data or access to the IT systems in an organization falls into the wrong hands especially if these parties/individuals have malicious intent. Definition of IT Security IT security is concerned with providing the necessary protections to prevent unauthorized access to confidential data and systems thus making them secure and highly reliable. This means protecting the systems and sensitive information therein
2.1 Theories on Technological Adoption At the core of this research is the need to understand how both mobile phones and the software applications created for the device are diffused and adopted in the context of a developing country. Mobile phones have achieved incredibly high levels of adoption in developing countries, despite low levels of penetration of older ICTs. There are extensive interpretations in the ways new technology is adopted and used by individuals. As this thesis will be exploring the role of technology in a developing country, this poses specific challenges to most theories of technology adoption. Several mainstream technology adoption models will be explored and critiqued to provide a sound theoretical basis of analyzing
By changing it to, “Cellphones have majorly impacted and changed the modern way of life.”, it becomes more interesting. The thesis statement is, “Cell phones are a necessity in one’s day to day life.” If changed to, “Cell phones are vital and play
The second generation endorsed its features wherein one is bestowing its customers to link calls between different parts of the world yet as mentioned above it needs changing the SIM in order to take and make calls in three different continents. In behalf of that, progress may be needed for the said generation that will make it available to have a simple and single network that will be able to access the countries without the need for alternating SIM. For that reason, it paved way to another mobile communication development which is a precursor to 4G. The third generation system is the system of mobile phone communication that was implemented by the countries in Asia such as the Japan and Korea during 2001. This generation includes more functionality in contrast to its predecessor for the past few decades.
Technology, Multitaskers, and Questionable Skills Throughout the last couple of decades, technology has progressed taking us further into a more developed and informative world. The internet has played a major role in this progression and altered the way in which we communicate and interact. Some may ask, “where would we be without technology and the internet?” or “I need my phone, where’s my phone?” The constant need for technology is interfering with daily activities and aiding in the masses being less aware of their surroundings which causes frustration and disconnects human interaction. At the forefront of society, technology looms over humanity with its ever-changing face and has taken precedence over priorities, increase multitasking,
The obstruction of connecting two regions has drastically decreased due to the fact that we now have mobile phones, Internet, and social media to make life easier. Businesses and organisations are relying on it and are gaining benefits from it. Communication Technology impacts on public and private life The modern methods of communication play a significant role in both our private and public life, commonly positive but they can also have negative effects. Through social networking sites, we can find people sharing the same interests as us, hence, making new friends or even finding a suitable