Computer Intrusion and Intrusion Detection Systems
9th Dec 2019
Introduction:
CHAPTER ONE
LITERATURE REVIEW
Computer Intrusion and Intrusion Detection Systems
Computer intrusion which is a process of illegitimately obtaining unauthorized access to a computer system is a ...
Tag: Cyber Security
Browse all dissertation content tagged as "Cyber Security" including dissertation examples, dissertation proposals, topic and title ideas, individual dissertation chapter examples, and help guides for both undergraduate and masters students.
Articles
Business Continuity Planning: Cyber Security Management
9th Dec 2019
Introduction:
Table of Contents
ABSTRACT
I. INTRODUCTION
II. BUSINESS CONTINUITY PLANNING METHODOLOGY
II.1 BUSINESS CONTINUITY STRATEGY
II.2 BCP ROLES AND RESPONSIBILITIES
II.3 BUSINESS CONTINUITY PLAN SU...
Survey of Data Breaches
9th Dec 2019
Introduction:
Survey of Data Breaches
Abstract — Data breaches are a significant part of our everyday lives and understanding their legal and financial impact is important. Data breaches have significant negati...
Prevention and Detection of Phishing Methods: Advantages and Disadvantages
9th Dec 2019
Introduction:
ABSTRACT
With the current continuous growth of data and the increasing access to internet, people are always thinking of ways to gain data from other people usually through the internet. One of the m...
Email Security Strategy
9th Dec 2019
Introduction:
Email Security Strategy
The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application...
Three Step Authentication for ATM Machines
9th Dec 2019
Introduction:
Chapter 1: INTRODUCTION TO THE STUDY
1.1 Background to the Project
ATM known as Automated Teller Machine was invented by John Shepherd-Barron during the early 1960s. ATM is a cash dispensing machine ...
Social Engineering Overview: Techniques, Impacts and Defences
9th Dec 2019
Introduction:
Table of Contents
Page 2 – Abstract
Page 3 – Introduction
Page 3 – Social Engineering Overview
Page 6 – Social Engineering Fundamentals
Page 7 – Types of Social Engineering Techniques
Pa...
Phishing Attack in Healthcare Insurance Provider
9th Dec 2019
Introduction:
Phishing Attack in Healthcare Insurance Provider (Sermelles Limited)
Table of Contents
Title Page
Abstract
Introduction
Literature Review
Information Security issues/Threats/Vulnerabilities
Securit...
Cryptographic Procedures to Guarantee Data Security
9th Dec 2019
Introduction:
CHAPTER-1
Introduction
With the developing prevalence of system and the improvement data handling, a high rate of computerized picture data transmission in the system are identified with individua...
Role of Cloud Computing in Cyber Resilience
9th Dec 2019
Introduction:
Table of Contents
Introduction
Review of literature
Research Problem and Discussion
Introduction
Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic ...
Solution to Online Privacy and Personal Data Issues
9th Dec 2019
Introduction:
Contents
Introduction
Context
Online Services and Personal Data
Online Privacy
Solid
ReactJS
Conclusions
References
Introduction
This literature review will determine the current issues surrounding p...
Exploring Policy Conditions for Cyber Deterrence: An Estonia Case Study
9th Dec 2019
Introduction:
Exploring Policy Conditions for Cyber Deterrence: An Estonia Case Study
Table of Contents
Abstract
Exploring Policy Conditions for Cyber Deterrence: An Estonia Case Study
Deterrence and Cyberspace
...
Web Browser Fingerprinting: Attack on Privacy
9th Dec 2019
Introduction:
Table of Contents
(Acknowledgements)
(List of figures & tables)
(List of abbreviations & acronyms)
Abstract
Chapter 1
1.1 Introduction
1.2 Aims of research
Chapter 2
2.1 Web Browser Fin...
Security Mechanisms for IoT Devices and Applications
9th Dec 2019
Introduction:
Table of Contents
CHAPTER 1
Introduction and Report Outline
1.1 Aims and Objectives:
1.2 Literature Survey:
CHAPTER 2
Literature Survey
2.1 What is an iot?
2.2 What is a WSN?
2.3 Components in WSN:
2...
Security Assessment of Internet of Things
9th Dec 2019
Introduction: My objective with this report is to analyse the state of security with regards to IoT by assessing the controls put in place by manufactures of such devices and then propose how they can improve and also implement new security controls into such devices....
Cybersecurity: Analysis of Issues and Threats
9th Dec 2019
Introduction:
Cybersecurity: Analysis of Issues and Threats
ABSTRACT
Cybersecurity has gained considerable attention in last decade due to its ability to secure government’s data against expanding cyber threat...
Stakeholder Perceptions and Experiences of Cyber Defence
9th Dec 2019
Introduction:
The objective of this research is to explore stakeholders’ first-hand experience, beliefs, and opinions related to cybersecurity and Active Cyber Defence (ACD) in the Canadian Critical Infrastructu...
Popular Tags
- Browse All Tags
- Accounting
- Banking
- Biology
- Biomedical Science
- Business
- Business Analysis
- Business Strategy
- Cancer
- Chemistry
- Computer Science
- Construction
- Consumer Decisions
- Criminology
- Cultural Studies
- Cyber Security
- Economics
- Education
- Electronics
- Employment
- Energy
- Engineering
- Environmental Science
- Environmental Studies
- Equality
- Finance
- Food And Nutrition
- Health
- Health And Social Care
- History
- Human Resources
- Information Systems
- Information Technology
- International Business
- International Relations
- International Studies
- Law
- Leadership
- Management
- Marketing
- Mechanics
- Media
- Medical
- Medicine
- Mental Health
- Neurology
- Nursing
- Pharmacology
- Physiology
- Politics
- Psychology
- Sciences
- Social Policy
- Sociology
- Sustainability
- Teaching
- Technology
- Tourism
- Young People