The multiple functions and massive adoption of the internet or the computer world calls for high and sensitive security signals and procedures that are do to protect business areas dealing with information technology The information technology sector therefore needs desexualize policies determine software and hardware , secure protocols , secure networks and secure cryptanalysis (Tian , Keep , 2005 ,.14One of the ways in which security within the information technology can be ensured is through cryptograph and secret writing . Since computers are utilise for information exchange , t he information from unlike sources should be! protected to prohibit extrajudicial access or sharing of information Initially codification methods and coding were used in military communication and coordination . When the information is protected , provided crypto conversation can take place . steganography is the employment of mathematical signs and functions to aid conversion...If you want to get a liberal essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.