Technology information technology Essays

18 essay samples found

Impact of IBM PC and Apple

“In the 1980’s technology would begin its’ evolution into the twenty-first century of instant communication which would in return bring positive cultural benefits and infringements on national security. Until the 1980’s, a standard computer would cost 9 million dollars, require a quarter acre of air conditioned space, and 60 people to operate it. The IBM […]

Pages: 3 Words: 789 Topics: Apple Inc, Communication, Computers, Digital Technology, Information Technology, Internet, Security, Smartphone

The Internet of Things: Wireless Network of Uniquely Identifiable Connected Devices

Problem: The Internet of Things (IoT) may be defined as a wired or wireless network of uniquely identifiable connected devices which can process data and communicate with each other. Reinfurt (2016) discussed many different types of IoT devices such as service gateways, device shadows, rule engine, device wake up, all of which have challenges and […]

Pages: 6 Words: 1937 Topics: Computer Networking, Computer Security, Information Technology, Internet, Internet Of Things
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

About Cybersecurity

I believe everything that is created by man can also be destroyed by it. Humans have proved to be the most intelligent species in this world. We have created the technology that appears to be smarter than the human brain but if it overpowers the human intelligence it can be destroyed as well. Internet works […]

Pages: 5 Words: 1550 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Information Technology, Internet

The Rise of Technologies and Cyber Threats

There is a wide range of cyber threats that happen every day, it is important that we follow all of the necessary precaution’s in order to ensure the safety of our private information including but not limited to passwords, network credentials, banking or credit card information. Malicious attacks occur more frequently than one would expect, […]

Pages: 4 Words: 1215 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Smartphone

The Real Issue Behind Cyber-Security

The steady trend towards digitalization has been occurring for a long time, and as of lately, a new type of crime market has risen alongside digitalization. In recent years, companies all over the world have been affected by some form of cybersecurity issue whether that be attacks to infrastructure or momentary paralyzation of the company […]

Pages: 4 Words: 1229 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Policy

Cyber Security Threats on the State Level

This paper examines two notable events of cyber warfare and security in our current age (the Stuxnet attack on centrifuges, and the Petya ransomware affecting citizens and governmental agencies), as well as examines how these attacks shape foreign and domestic policies and procedures. By examining the extent of the damage of these two attacks, I […]

Pages: 7 Words: 1988 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, National Security, Policy, Security

Cyber Security Threats in Healthcare

With cyber-attacks over the course of 2018 targeting one of the largest industries in the United States – the healthcare industry – it’s time to hone in on protecting patient and institutional information with a more focused approach to cyber-security. Compared to other industries, most healthcare organizations are underinvested in cybersecurity and spend roughly half […]

Pages: 5 Words: 1429 Topics: Cloud Computing, Computer Networking, Computer Security, Crime Prevention, Cyber Security, Cyberspace, Health Care, Information Technology

Exploiting Internet of Things and its Application in Healthcare Domain

Abstract Internet of Things (IoT) is a network of physical devices such as sensors, actuators, electronic device, software and actuators which allows data transmission and reception across these modules. Internet of things has made significant strides in consumer, enterprise and infrastructure spaces. It has penetrated in every well known market today. A few examples of […]

Pages: 10 Words: 3080 Topics: Disease, Information Technology, Internet Of Things

Cyber Security for our Generation

Some of the biggest threats to ordinary people’s security often go unnoticed. Some of the biggest threats to our national security often go unnoticed. These threats often are not publicized, and no emphasis is given to them. These are some of the biggest threats that people face in our generation. The shocking part about these […]

Pages: 11 Words: 3209 Topics: Communication, Computer Security, Cyber Security, Cyberspace, Facebook, Information Technology, Internet, Security, Terrorism

Security in Internet of Things

Abstract The Internet helped people to connect with static information available but now it’s helping to build connection from people to people, physical things. Now-A-Days Internet of Things(IOT) represents a diverse technology and usage with wide range of business opportunities and risks. IOT allows the data to be transferred from physical devices to the internet. […]

Pages: 7 Words: 2129 Topics: Computer Networking, Cyberspace, Digital Technology, Information Technology, Internet, Internet Of Things

Cybersecurity for a Successful Acquisition Report

The act of conducting a policy gap analysis is crucial in determining any missing overlap or technical deficiencies when planning to join the IT architecture and network topologies of two or more companies. During the acquisition process, the policies of either party will be examined in order to confirm current software updates and patches, proper […]

Pages: 4 Words: 1270 Topics: Computer Security, Cyber Security, Information Technology

Research on Self-driving Cars

I am doing my research on self-driving cars. A self-driving is basically just a car that drives itself. It is a car or truck in which human drivers are never required to take control to safely operate the vehicle. Also known as autonomous or “”driverless”” cars, they combine sensors and software to control, navigate, and […]

Pages: 1 Words: 433 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Self Driving Cars

Project Description Facebook

Project Description Facebook is an American social networking service founded 14 years ago that is on February 4th, 2004 by Mark Zuckerberg headquarters in California. We can create an account in Facebook with email id and password and upload the pictures, videos. Facebook is also linked with other products like Messenger, it’s a messaging application […]

Pages: 2 Words: 534 Topics: Cyberspace, Digital Technology, Facebook, Information Technology, Social Media

The E-Commerce and Cyber Security

The wish is the online e-commerce company that will provide the opportunity for all shoppers to find their favourite wordrobe online in all of the world. Their wardrobe could be included dresses, skirts, jeans and etc…. This company was founded in 2010 and also have the App for their over 100 million users on the […]

Pages: 2 Words: 526 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Information Technology, Internet

Cybersecurity as a Form of Digital Protection

Cybersecurity is an ever-growing form of digital protection created and used for the sole purpose of protecting confidential information against hard drive malfunctions, power outages, and adversaries. In Healthcare, it is crucial for hospitals and health providers to keep up with the security of digital health data through cybersecurity in order to comply with The […]

Pages: 2 Words: 565 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Policy

Cybersecurity Today

Network (internets) are not secure enough due to the lack of efficient cybersecurity. As a result, ransomware attacks are increasing affecting most businesses and individuals today. Enacting measures to detect cyberattacks and ransomware attacks can be helpful in preventing unforeseen repercussions from the attacker in the corporate network. Cybersecurity needs to implement new policies and […]

Pages: 2 Words: 528 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Security

Reasons of Cyber Attacks

1. Substandard User ID and Password Every individual need to have their own password secure and stronger. For an instance strong password can be obtained by latest maintaining minimum of having15-character length with an least one special character, number, capital and small alphabet. Most importantly choosing password like own name, date of birth, phone number […]

Pages: 3 Words: 803 Topics: Computer Security, Cyber Security, Cyberspace, Information Technology

Encrypt your Device

With increased popularity of mobile devices, cell phones have become the new target for hackers and outside security breaches. Since cell phones are so accessible, it’s become the new trend to work out of the palm of your hand while traveling or in between home and the office. While this may be convenient, it’s also […]

Pages: 3 Words: 977 Topics: Cell Phone, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price