Cyber Crimes Paper

Page 37 of 50 - About 500 Essays
  • Premium Essay

    Issues Concerning Computer Crimes

    Issues Concerning Computer Crimes Any time the military or an organization makes a major change, whether it's a new customer service plan, restructuring, downsizing, or in the case of this paper a new leader, it's the job of the leadership and management teams to communicate the new change effectively. "An organization will take on the personality of its top leader" (Phillips, pp 63-4). This famous quote by Abraham Lincoln is as true and accurate in today's organizations as it was over a

    Words: 2401 - Pages: 10

  • Free Essay

    Botnet Analysis and Detection

    Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the

    Words: 13171 - Pages: 53

  • Premium Essay

    Challenges and Prospect of Entrepreneur in Nigeria

    like Nigeria. This paper is concerned with the nature and the extent to which entrepreneurship in Nigeria has been developed so far, and outlines the initiative by government and also the main current and future challenges and perspectives for the development of entrepreneurship. The study revealed that such initiatives by government failed abysmally due to over bearing bureaucracies, corruption, inadequate and inefficient infrastructural facilities and maladministration. The paper concludes that entrepreneurship

    Words: 5924 - Pages: 24

  • Free Essay

    Mobile Forensics in Healthcare

    2009 Eighth International Conference on Mobile Business Mobile Forensics in Healthcare Connie Justice, Huanmei Wu Computer & Information Technology Purdue School of Engineering and Technology Indiana University Purdue University Indianapolis 799 W. Michigan St., ET 301 Indianapolis, IN 46202 {cjustice, hw9}@iupui.edu Abstract -- Mobile communication has been heavily applied in the current healthcare system for health information exchange. Patient information security has become a major concern

    Words: 4340 - Pages: 18

  • Premium Essay

    Guide to Legal

    CAREER GUIDE TO THE LEGAL PROFESSION INDEX Page 1 THE ADMINISTRATION OF JUSTICE IN SOUTH AFRICA.......................2 2 THE LEGAL PROFESSION ...............................................................................5 3 THE ATTORNEYS’ PROFESSION...................................................................7 4 ADMISSION OF ATTORNEYS / SOLICITORS FROM OTHER COUNTRIES ...........................................................................15 5 THE ADVOCATES'

    Words: 5872 - Pages: 24

  • Premium Essay

    Isys100

    6) Throughout the world there has been an increase in discussions regarding “Censorship of the Internet”, explain how Censorship can work in some instances but in others it can be a detriment to society. Introduction Since electronic devices such as computer, smart phone and tablet have generalised and the number of internet users is getting bigger, internet contains tremendous amount of information from trivial one to even significant information that could occur a social problem. Every information

    Words: 2055 - Pages: 9

  • Free Essay

    Developing Countries Nd Technology

    investment. Although some people believe that it is not necessary for developing countries to invest more in technology; the progress that has been made for the past 30 years due to technology has brought about many benefits. Therefore the purpose of this paper is to point out that technology will allow work to be done at a faster rate, provide security, create

    Words: 2187 - Pages: 9

  • Free Essay

    Icmp Research Paper

    ICMP Vulnerabilities and its Countermeasures By Shweta Jhunjhunwala (MITS,Lakshmangarh) Kriti Goenka (MITS, Lakshmangarh) Sandeep Tanwar (GPMCE,IP University, Delhi) Abstract: To prevent distributed denial of service (dDoS) attack via ICMP (ping). 1. Introduction ICMP or The Internet Control Message Protocol is the de facto protocol used to communicate error messages reporting errors that might have occurred while transferring data over networks. ICMP messages are sent in several situations:

    Words: 2311 - Pages: 10

  • Free Essay

    Computer Science

    Positive and Negative Impact of Computer in Society The Social Impact of Computer in Our Society From the time of the invention of the computers to the present day, computers have met tremendous changes. Time to time incorporation of the latest technical achievement has made the use of computer easier. More and more application have been developed and almost all the areas of the professions have been computerized. Computerization is continuously becoming an important part of many organizations.

    Words: 2409 - Pages: 10

  • Free Essay

    The Effect of Communication on the Employee Performance in an Organization

    College of technology Department of information technology Project proposal on online crime management system BY TSEGAY GEBREHIWET ID TER/1918/03 Contents 1. INRODUCTION 2 1.1Back ground of the organization 4 1.2 Mission 4 1.3 Vision 4 1.4Purpose 4 1.5 Tasks undertaken by the organization 5 2. Statement of the problem 5 2.1 Proposed System 6 3 Objective of the project 8 3.1General objective………………………………… 8 3.2 Specific objective…………………………………. 8 4.Scope of the project 9 5.Significance

    Words: 6601 - Pages: 27

Page   1 34 35 36 37 38 39 40 41 50