Sign In
Not register? Register Now!
Essay Available:
You are here: HomeOther (Not Listed)Technology
Pages:
2 pages/≈550 words
Sources:
No Sources
Level:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

A Reflection On The Data Communications Class Discussions And Readings (Other (Not Listed) Sample)

Instructions:

The task was to write a reflection on the data communications class discussions and readings.

source..
Content:


Data Communications Reflection
Name
Institution
Professor
Course
Date
As the computer network security advances and reaches a point that has never been reached in history, so do computer networks become more vulnerable than they have ever been. Network and operating system security has come a long way since computers were first introduced. Today, there are more users of the computer, and computer systems have had to support many simultaneous users. The security of computer systems has had to become more complex so that users can be protected from one another. After having gone through the reading assignments, I have chosen the three concepts that interested me the most to be the subject of my refection. These are auditing, system development life cycle, and network modelling.
Auditing is a very important process in data communication in that it can help to deter crime ad to apprehend the criminal after having committed a crime. This, it does through a software program whose work is to monitor every transaction within a system. This concept relates to data communication in that it monitors transactions and records them according to the time when they occurred. Inappropriate transactions have their data scanned and their information retrieved. The best thing about auditing is that there are several computer programs that are available which are good enough to be able to audit all the transactions occurring on the computer system. In addition, there is no waste of money in auditing because if it helps to catch a criminal and prevent crime, the cost of installing it is nothing co

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Describe Information Security Training and Awareness
    Description: It could be explained further that quantitative study comprises of collection of raw data and consequent conversion of statistical information into mathematical...
    26 pages/≈7150 words| 15 Sources | APA | Technology | Other (Not Listed) |
  • Modern Braking Systems Technology Research Assignment
    Description: This will be the topic that will be addressed in this paper. The antilock braking system has also been referred as ABS system....
    5 pages/≈1375 words| 5 Sources | APA | Technology | Other (Not Listed) |
  • U2 Research Project: Windows PowerShell
    Description: Windows PowerShell is a .NET-based framework from Microsoft that is used for automating and configuring management tasks...
    1 page/≈275 words| APA | Technology | Other (Not Listed) |
Need a Custom Essay Written?
First time 15% Discount!