Computer Security, Defines encryption and explain how it is used to protect transmission of information
Title: Computer Security, Defines encryption and explain how it is used to protect transmission of information
Category: /Science & Technology/Computers and Cybernetics
Details: Words: 888 | Pages: 3 (approximately 235 words/page)
Computer Security, Defines encryption and explain how it is used to protect transmission of information
Category: /Science & Technology/Computers and Cybernetics
Details: Words: 888 | Pages: 3 (approximately 235 words/page)
1 Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of
showed first 75 words of 888 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 888 total
rogram development is the early involvement of the end-users. This provides the programmer as well as the end-user with important functionality of the new system and help them to adapt to the new working environment more efficiently and effectively. The continuos training of the staff is essential in meeting the objectives of the organization since they will be provided with needed skills and expertise necessary to deal with daily issues using of new system.