Sökt på: Sökresultat
totalt 19 träffar
Securing Government Information and Data in Developing Countries
The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic …
Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities
Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. …
Security Solutions for Hyperconnectivity and the Internet of Things
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This …
Detecting and Mitigating Robotic Cyber Security Risks
Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention …
Algorithmic Strategies for Solving Complex Problems in Cryptography
Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can …
Information Technology Risk Management and Compliance in Modern Organizations
Attacks on information systems and applications have become more prevalent with new advances in technology. Management of security and quick threat identification have become …
Security Management in Mobile Cloud Computing
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new …
Managing Security Issues and the Hidden Dangers of Wearable Technologies
Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, …
Chaos Synchronization and Cryptography for Secure Communications
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications …
Online Banking Security Measures and Data Protection
Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system …
Cybersecurity Breaches and Issues Surrounding Online Threat Protection
Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or …
Security Breaches and Threat Prevention in the Internet of Things
As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is …