Smart Materials

Page 19 of 50 - About 500 Essays
  • Free Essay

    How Should Singapore and Other Smart Cities Deal with the Increasing Risk of Cyber Threats?

    How should Singapore and other smart cities deal with the increasing risk of cyber threats? Fifty years after its establishment, Singapore is a smart city-state success story at the forefront of a third industrial revolution. Today, the Internet of Things (IoT) increasingly interconnects Singapore’s cyber and physical systems, sensors and smart technology into the digital fabric that links society and critical infrastructures such as transportation, health, finance and defense. Infrastructure

    Words: 417 - Pages: 2

  • Premium Essay

    Disaster Recovery Plan

    | Enhanced Security for Data Access | | Richard Edvalson 1/12/2014 | Contents I. Contents 1 II. Introduction 5 III. Access Control Layers 5 A. The Access Control Perimeter 5 B. Asset Containers 5 C. Workplace Perimeter 5 IV. Access Control Methods and Technical Strategies 5 A. Identification, Authentication, and Authorization 5 B. Logical Access Controls 5 1. Network Architecture Controls 5 2. Remote Network Access 5 3. Security Network Ports 5

    Words: 590 - Pages: 3

  • Free Essay

    Qwdqwdqwdqwd

    1. Introduction In today’s business negotiations, dressing etiquette plays an important role. It embodies not only the personal taste but also the self-cultivation. To some extent, it can even make it all difference in the result of business negotiations. The more attention we draw to the details in modern business negotiations, the greater we will care about our dressing etiquette and maintain our personal image. Through analyzing dressing etiquette in business negotiations, the author tends

    Words: 1819 - Pages: 8

  • Free Essay

    Computer Security

    Assignment 1 Solution 1. Compare and contrast symmetric encryption with public-key encryption, including the strengths and weaknesses of each. Solution Scalability: with public-key encryption, multiple users can send encrypted messages to Alice using her public key and these messages can be decrypted only by Alice; thus, a linear number of publicprivate key pairs need to be established, distributed and protected to allow pairwise confidential communication between any two users; instead, symmetric

    Words: 578 - Pages: 3

  • Free Essay

    Power Grid Crash in India

    Power grid 1 Red tape meets black wire Just a few days ago 10 per cent of the world’s population faced a series of power cuts – India’s Northern and Eastern grids came to halt and 600 million people were confronted with the delicate state of their nation’s electricity grid. The reason for the power failure is complex, and you can read more detail below, but essentially it came down to one thing: the power system had recently been transformed from a system to move electricity around this

    Words: 2065 - Pages: 9

  • Free Essay

    Smart Card

    Introduction: Recently, all the banks in Kuwait use the smart cards instead of the regular credit and debit cards. A smart card resembles a credit card in size and shape, but inside it is completely different. First of all, it has an inside -- a normal credit card is a simple piece of plastic. The inside of a smart card usually contains an embedded microprocessor. The microprocessor is under a gold contact pad on one side of the card. Think of the microprocessor as replacing the usual magnetic stripe

    Words: 881 - Pages: 4

  • Free Essay

    Atm Services

    hiiii A T M (Automated Teller Machine) facilitates the customer to do Banking transactions such as Cash withdrawal, balance enquiry, obtaining mini-statement, transfer of funds between his/her own accounts etc. Union Bank of India tied up with Visa for issuing International Debit Cards to the customers of all its branches. The Debit Card provides ‘ANY TIME / ANY WHERE’ Banking to the customers. Presently, Bank has 2634 ATMs (as on 31.03.2011) which are on-line (connected to a switch), conveniently

    Words: 252 - Pages: 2

  • Free Essay

    Smart Homes Technology

    details and managing daily life activities can now live independently with the assistance of smart computer systems. Sleep regulation warnings, ergonomic assistance in moving around the living space and cooking assistance systems are a few examples in this regard. Moreover, assistive technologies help ageing population better interact with technological devices such as smartphones. The emergence of smart technologies has opened the portal for the development of increasingly powerful and customized

    Words: 1073 - Pages: 5

  • Premium Essay

    Century Banks

    1- Describe the security vulnerabilities exploited by the hackers. “The 21st century bank heist” was one of the biggest bank robberies that demonstrated by a group of hackers, and a global network of cyber criminals operating more than 26 countries stole 45 million by hacking into a database of prepaid debit cards. Hackers got into bank databases, and eliminated withdrawal limits on all available pre-paid debit cards and created access codes then loaded that data into a plastic card (an old hotel's

    Words: 560 - Pages: 3

  • Free Essay

    Chapter 6 Review Questions

    1. You are preparing to implement smart cards into your organization for all users. Which Windows Server 2003 service must you install in order to support smart card authentication? A: b. Certificate Service 2. Based on strong password characteristics, what is wrong with the password TiGer01? What would you recommend changing to make this password stronger? A: Do not use a full dictionary word, make it at least 8 characters, and add a symbol/special character to the password. 3. One

    Words: 425 - Pages: 2

Page   1 16 17 18 19 20 21 22 23 50