Research paper topics, free example research papers

Free research papers and essays on topics related to: data security

  • 9 results found, view research papers on page:
  • 1
  • A Look At Public Key Encryption - 1,210 words
    A Look at Public Key Encryption Encryption is the process of disguising information by transforming plain text into gibberish, or ciphertext, which cannot be understood by an unauthorized person. Decryption is the process of transforming ciphertext back into plaintext that can be read by anyone. Example of encryption can be found in history, for example in the era of the Cold War, the Solviet Union and the United States would send electronic messages to one military point to another, encrypted. If the enemy intercepted the message, they would have to crack this message to get the information. Typically when governments used encryption they used a very complex method of encrypting messages. E ...
    Related: data encryption, encryption, national security, major problem, essence
  • Adp Security Evaluation - 1,938 words
    Adp Security Evaluation Valuation of a Security Automatic Data Processing, Inc. ADP April 7, 1999 Spring Hill College Management of Financial Resources Dr. Ralph Sandler ADP Automatic Data Processing, Inc. (NYSE:AUD) ADP is one of the largest independent computing services firms in the world with more than $4.5 billion in annual revenues and more than 425,000 clients. Founded in 1949, ADP provides computerized transaction processing, data communications, software, and information services to companies in virtually every industry. ADP Employer Services is the worlds largest provider of payroll services and human resource administration systems. It offers a comprehensive range of benefits, pa ...
    Related: data security, evaluation, security issues, world economy, most admired
  • Computer Crime - 1,366 words
    ... ses spread from program to program and computer to computer, much as biological viruses spread within individual...members of a society. (Chess, 1997) Diskettes were the primary carriers of viruses in the 1980s. (Computer, 1997) Today, they are e-mail attachments, file transfers and infected software downloads or uploads. Networks can even spread viruses to large numbers of connected PCs rapidly. (Yang, 1998) No one working on a [personal computer] is risk free; more viruses are being spread today than ever before, but more help is being developed as well. Special software is now in stores that will help to prevent any major disasters that viruses can cause. (Miastkowski, 1998) Antivirus ...
    Related: computer crime, computer security, computer viruses, crime, personal computer
  • Computer Crime - 1,361 words
    ... m program to program and computer to computer, "much as biological viruses spread within individual...members of a society." (Chess, 1997) Diskettes were the "primary carriers of viruses in the 1980s." ("Computer," 1997) Today, they are e-mail attachments, file transfers and infected software downloads or uploads. Networks can even spread viruses to large numbers of connected PCs rapidly. (Yang, 1998) No one working on a [personal computer] is risk free; more viruses are being spread today than ever before, but more help is being developed as well. Special software is now in stores that will help to prevent any major disasters that viruses can cause. (Miastkowski, 1998) Antivirus softwar ...
    Related: computer crime, computer security, computer viruses, crime, personal computer
  • Fiber Optics - 1,648 words
    Fiber Optics Thesis: Some of the important features of the fiber optics that we are interested are discussed below. Now a days we are using copper wires as they are the most cost effective and reliable interconnect in parallel machines. However as machines grow more powerful, wire density becomes critical making fiber possible alternatives because of their small wire size. Fiber optics are used mainly to use effectively its high bandwidth. On a single fiber lots of information/data can be transmitted concurrently and in parallel. Over 1000 high bandwidth (100-200 Mb/s) independant channels or busses can be supported on a single optical fiber. Furthermore multiple buses can co-exist on a sing ...
    Related: fiber, fiber optics, optics, computer networks, magnetic field
  • Fiber Optics - 1,561 words
    ... on requires great deal of changes in current networks and systems. This requires a lot of time and effort which the management is not willing to sacrifice. People are comfortable with what they have and don't want to change. Although most problems regarding program changing can be solved, the solutions to it will take much longer than expected. Thus, any new program has to be a big improvement over the old one to justify a significant change (although the great improvement usually means that the old program does not work). Another fundamental problem in fiber optic LANs is the change in technology. The hardware and software to make LAN run efficiently add up to an expensive package. If m ...
    Related: fiber, fiber optics, optics, quality control, data security
  • The Internet - 1,983 words
    The Internet The Internet is, literally, a network of networks. It is made of thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to humble PCs in people's homes and offices. Despite the recent publicity, the Internet is not a new thing. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense's communications systems. Fearing the consequences of nuclear attack, there was no central computer holding vast amounts of data, but instead the information was dispersed across thousands of machines. A protocol known as TCP/IP was developed to a ...
    Related: internet addiction, internet network, internet service, world wide, environmental concerns
  • Wireless Technology - 2,124 words
    Wireless Technology Wireless Technology applied to Computer Processing Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operations that must be carried out efficiently on demand. This paper summarizes technological changes that are underway and describes their impact on wireless computing development and implementation. It also describes ...
    Related: technology, wireless, wireless technology, standards committee, electromagnetic radiation
  • Wireless Technology - 2,058 words
    ... ss, you would have to use the same brand of network interface card throughout your network. Right now you are, for the most part, tied to whichever brand of wireless LAN you pick. Most of the products in this comparison listed their wireless protocol as Ethernet carrier sense multiple access/collision avoidance (CSMA/CA), a variation of standard Ethernet. Unfortunately, each vendor has put its own spin on CSMA/CA, which means even their protocols are incompatible. 5 Wireless services As technology progresses toward smaller, lighter, faster, lower power hardware components, more computers will become more and more mobile. For space concerns this paper will exclude any further discussion o ...
    Related: technology, wireless, wireless technology, operating systems, application software
  • 9 results found, view research papers on page:
  • 1