Essays about: "information technology threats and advantages"

Showing result 6 - 10 of 10 essays containing the words information technology threats and advantages.

  1. 6. Analysis of security issues in cloud based e-learning

    University essay from Högskolan i Borås/Institutionen Handels- och IT-högskolan

    Author : Gunasekar Kumar; Anirudh Chelikani; [2011]
    Keywords : security; cloud based e-learning technology; security management standard; security measures; learning management system; security threats;

    Abstract : Cloud based E-Learning is one of the booming technologies in IT field which brings powerful e-learning products with the help of cloud power. Cloud technology has numerous advantages over the existing traditional E-Learning systems but at the same time, security is a major concern in cloud based e-learning. READ MORE

  2. 7. Analyzing Common Criteria Shortcomings to Improve its Efficacy

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Rana Aamir Raza Ashfaq; Mohammad Qasim Khan; [2009]
    Keywords : CC; Common Criteria; Evaluation of Common Criteria; Analyzing Common Criteria; Common Criteria Shortcomings; Information Technology;

    Abstract : Information security has become a key concern for organizations conducting business in the current electronic era. Rapid technological development continuously creates novel security threats, making IT an uncertain infrastructure. So the security is an important factor for the vendors as well as for the consumers. READ MORE

  3. 8. SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : Syed Majid Ali Shah Bukhari; Inayat Ullah Khan; [2009]
    Keywords : SWOT Analysis; IMS; Security Authentication. ;

    Abstract : SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies for users and network operators. Due to SWOT tool we have been able to describe strengths, weakness, opportunities and threats in each authentication scheme separately. READ MORE

  4. 9. Consequences of the implementation of the Loading Ledge - A descriptive case study at IKEA

    University essay from Lunds universitet/Förpackningslogistik

    Author : André Jonsson; Björn Mathiasen; [2004]
    Keywords : Unit load; packaging logistics; logistics; supply chain; wooden pallet; material handling; new unit load concept; Technological sciences; Teknik; Technology and Engineering;

    Abstract : Title: Consequences of the implementation of the Loading Ledge Authors: André Jonsson and Björn Mathiasen. Supervisors: Daniel Hellström - Division of Packaging Logistics, LTH. Mazen Saghir - Division of Packaging Logistics, LTH. Rickard Andersson - IKEA. READ MORE

  5. 10. Virtual networks in the cellular domain

    University essay from KTH/Mikroelektronik och Informationsteknik, IMIT

    Author : Gustav Söderström; [2003]
    Keywords : overlay networks; group casting; real-time services;

    Abstract :  Data connectivity between cellular devices can be achieved in different ways. It is possible to enable full IPconnectivity in the cellular networks. However this connectivity is combined with a lot of issues such as security problems and the IPv4 address space being depleted. READ MORE