The multiple functions and massive adoption of the internet or the computer world calls for high and sensitive security signals and procedures that ar do to protect business areas dealing with information technology The information technology sector therefore needs unsex policies in force(p) software and hardware , secure protocols , secure networks and secure cryptanalysis (Tian , Keep , 2005 ,.14One of the ways in which security within the information technology can be ensured is through cryptogram and secret writing . Since computers are utilise for informa tion vary , the information from unlike sou! rces should be protected to prohibit guilty access or sharing of information Initially code methods and coding were used in military communication and coordination . When the information is protected , provided crypto conversation can take place . steganography is the employment of mathematical signs and functions to aid conversion...If you want to get a liberal essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.