Cyber securiy and cloudl computing - Research Proposal Example

Comments (1) Cite this document
Summary
This is because of how important the internet has become as part of the day to day existence of man. What is more, the internet has…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Cyber securiy and cloudl computing
Read TextPreview

Extract of sample "Cyber securiy and cloudl computing"

Download file to see previous pages several information technology (IT) based processing including cloud computing, social media networking, international communication, and global positioning system (GPS) navigation. Another aspect of the revolution is accessibility of the internet, whereby it has become easier for a person to have access to the internet today than two decades back. With the use of media devices such as smart phones, smart watches, and tablet computers, the internet is today one of the most portable technological inventions that can fit into every corner and space (Ziltrain, 2008). Indeed it cannot be denied that the revolution that has characterised the internet has several benefits to offer the ordinary user. In the estimation of Rehmeyer (2007), not only does the use of the internet today offers advantages but that the absence or non-usage of the internet comes with so much discomfort and disadvantages. Even though this position cannot be debated, the risks and vulnerabilities that the complexity of the internet poses to individual, organisations and nations cannot be denied.
In the opinion of Owens and Lin (2009), the best way to make the most out of the internet in today’s complex dynamic Web 2.0 environment is to ensure adequate cyber security for users. Without this, the list of how beneficial the internet is in today’s environment can go on but the real value that is expected to be derived may never be achieved to its fullest. The reason for this claim is that as news of cyber breaches continues to flood the airwaves, people become sceptical about their fate in using the complex and dynamic Web 2.0 for various purposes including cloud computing and electronic commerce (e-commerce) (Ziltrain, 2008). In such an atmosphere of mistrust and fear, the Web 2.0 will be seen as useful only for some of the most conventional purposes that come with limited or no risk such as gaming, information search, and downloading. Meanwhile as it has been hinted already, there are several ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber securiy and cloudl computing Research Proposal”, n.d.)
Cyber securiy and cloudl computing Research Proposal. Retrieved from https://studentshare.org/information-technology/1698681-cyber-securiy-and-cloudl-computing
(Cyber Securiy and Cloudl Computing Research Proposal)
Cyber Securiy and Cloudl Computing Research Proposal. https://studentshare.org/information-technology/1698681-cyber-securiy-and-cloudl-computing.
“Cyber Securiy and Cloudl Computing Research Proposal”, n.d. https://studentshare.org/information-technology/1698681-cyber-securiy-and-cloudl-computing.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
ma
marisol70 added comment 1 year ago
Student rated this paper as
The topic of "cyber securiy and cloudl computing" was hard to find. I spent too much time to find it. Here at StudentShare, I got the best sample. Many thanks!

CHECK THESE SAMPLES OF Cyber securiy and cloudl computing

Cyber Security

...? Cyber security 02-02 Cyber security According to www.thefreedictionary.com, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet, cyber space, cell phones and computers. However as we marvel...
10 Pages(2500 words)Coursework

Cyber Bullying

...? Cyber Bullying Introduction In the modern technological era, there has been increasing reliance of internet for personal recreation and business. Internet technology has transformed how people live and conduct business. It has become a virtually indispensable tool in education, entertainment, government, and business world (Willard, 2007). While it has become critical in the daily lives of adults, the internet has also become a major part of the children’s lives. Children use the internet for education purposes, online communication and social networking. Even though the internet technology affords children very useful avenue to learn, communicate and build relationships, it also opens possibility of technology misuse...
4 Pages(1000 words)Research Paper

CYBER LAW

..., preserving and promoting cyber security.”12 In the last few years there has been an increase in the risk of cyber security breaching; hence the current law emphasizes not only on formulating policies to curb such incidents to preserve cyber security, it also focuses on creating cyber security culture among the Internet users worldwide. The idea is to emerge with effective and compulsory provisions which would help promote and preserve cyber security while using computers, Internet, and other communication devices.13 Defamation Bill 2012-2013 The purpose of the current Defamation Bill is “to ensure that a fair balance is struck between...
7 Pages(1750 words)Essay

Computing

...Many tools are available to monitor and control large IT projects. They are project selection and reselection, project scheduling, estimating, and budgeting, planning, project team management and selection, stakeholder management, management support, procurement management, learning and knowledge management, and risk management. Project selection and reselection is one of the tools in the monitoring and control of large IT projects. Although Yetton (2000) uses this as an indication of how successful projects have been monitored and controlled, several other scholars (Cai et al., p. 1-22) use it as an independent variable. Project selection is the procedure of approving or rejecting projects. Project benefits are weighted... tools are...
6 Pages(1500 words)Assignment

Computing

... ComputingComputability Theory The field of computer science deals with the idea of computability theory which looks at mathematical and logical problems by examining their solvability. In essence it examines if a problem can be positively handled by a logic machine or not. In even simpler terms, computability theory works at the very limits of computing power so while we can expect computers today to be very powerful and complex machines; there are certain limits to the problems they can solve. In certain situations, computability theory suggests that specialized computers might be...
9 Pages(2250 words)Essay

Computing

...; employed for voice communication as well as TV, correspondingly. Fiber optics based communication and transmission medium engages installing the entire new fiber optic cables, complete set of little fibers of glass, consequently DSL is possible to be the existing choice for the majority informal Internet clients intended for a number of periods (Hintzr, 2010; Nash, 2000; Shelly et al., 2005). 6.3- Equipment and Installation Together DSL, communication and transmission medium normally utilize a modem or else router to interface through computers as well as additional Internet devices. DSL as well necessitates that voice devices in the home areas be ended by diverse filters to stop their dawdling the fastest DSL...
12 Pages(3000 words)Essay

Computer and Securiy Era

...security must be improved. Introduction of technologies such as Wifi, Cloud Computing, Mobile Telephony, Bluetooth etcetera, are setting new challenges for the world and especially for computer security professionals. The computer security issue has also become a matter of great concern for countries as they are now heavily dependent on internet for various kinds of their confidential data and processes. It is said that in future world, the wars between countries would be “Cyber War”, where the one with greater hacking skill can defeat the other one and may get the real sensitive data about their strategic planning, public database, defense system and other sensitive...
3 Pages(750 words)Research Paper

Computing

...The LZ encoding was developed in 1984 and has been identified as simple to implement due to its compatibility with hardware. Its purpose is to compress large English language documents. The encoding has been used in PDF files and allows the reduction of the size of a document. The compiler can be said to be a program used in the translation of computer language (Layton, 2007). It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a class of software used to perform a specified function. An office suite is an application used for editing written documents. Another example is a media player whose...
2 Pages(500 words)Coursework

Cyber Security and Cyber Crime

...to Private Security. 2nd ed. Belmont, USA: Cengage Learning, 2011. This is a law book aimed at giving the reader information on career opportunities in private security. In Part II of the book, Dempsey discusses the problem of computer crime, used interchangeably with cyber crime in the society and businesses. This book would be useful to that scholar seeking supportive surveys as the author documents surveys on cyber crime as conducted by the FBI and National Cyber Security Alliance, NCSA in the US. The book discusses most of the basic security procedure followed so as to mitigate cyber crime but is inclined more towards use of biometrics. The...
3 Pages(750 words)Annotated Bibliography

Cyber Security, Cyber Crime and Cyber Forensic

...of these agencies inhibits the acquisition of this vital resource thus undermining their operation (Finklea&Theohary, 2013). Question 2 The federal government agencies have the mandate to combat computer crimes. This is a well-organized agency which possesses the necessary expertise and efficient technology to combat digital crimes at the national level. The federal agency has thus created special sections within this organization so as to aid in combating this type of crime, this sections include: The secret service – this division has been created by the agency to fight computer crimes. It has been mandated to enforce the following responsibilities in relation to computer crime: (1)...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Proposal on topic Cyber securiy and cloudl computing for FREE!

Contact Us