BACKGROUND OF THE STUDY
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized data encryption system, readable data is altered into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concept to create coded message that is virtually impossible to break. It is easy to encrypt a message on a simple personal computer so that the biggest computer in the world could not decipher without spending for more time on the problem that exists in the life span of the entire universe.
There are two basic forms of encryption; private key encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decrypt message. Public key encryption also known as asymmetric key encryption uses two different keys at once, a combination of a private key and public key, the private key is known only to your personal computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
STATEMENT OF THE PROBLEM
Security is currently a widespread and growing concern that affects all areas of the society, in the same manner data and information security has become one of the most pressing challenges confronting all kinds of present day organizations owing to their rapid adoption of information technology (IT) in the entirety of their activities. This development has made data and information to a larger extend vulnerable to unauthorized users, spammers, crawlers and hackers who break into people’s and organization’s privacy. This has no doubt posed greater challenges on people who use database, share files and other resources on computer networks.
The aims and objectives of this work are as follows:
ABSTRACT: ASSESSMENT OF THE IMPACT OF GOVERNMENTAL ACCOUNTING FOR DISASTER RECOVERY FUNDS
This study assesses the impact of governmental...
Abstract
Sales promotion is among the important communications medium that has powerful effect on cons...
Abstract: This study explores the promotion of international collaboration in vocational tr...
Background of t
ABSTRACT: This study examined the role of early childhood education in teaching world history to young children. Objectives included assessing...
ABSTRACT This research work is determine, “The effect of credit management on profitability of Bank in Nigeria...
Abstract: THE ROLE OF RECRUITMENT TRAINING FOR HIRING MANAGERS This study aims to explore the role of recruitment training for hiring man...
BACKGROUND OF THE STUDY The emergence of non-governmental organizations (NGOs) in recent times has mot...
GENDER DYNAMICS IN PROTEST MOVEMENTS - THE ROLE OF WOMEN IN NIGERIAN PROTESTS (A CASE STUDY OF ENDBADGOVERNANCE PROTEST IN NIGERIA) Chapt...
Abstract Fintech has marked a new frontier in banking sector and mobile phone technology with an ever increasing number...
THE ROLE OF EARLY CHILDHOOD EDUCATION IN TEACHING WORLD HISTORY
THE EFFECTS OF CREDIT MANAGEMENT ON PROFITABILITY OF BANKS IN NIGERIA
THE ROLE OF RECRUITMENT TRAINING FOR HIRING MANAGERS
COMMUNICATION STRATEGY FOR NON GOVERNMENTAL ORGANIZATIONS ON CHILD ADOPTION; A CASE STUDY OF ORPHANAGE HOMES IN LAGOS STATE
GENDER DYNAMICS IN PROTEST MOVEMENTS - THE ROLE OF WOMEN IN NIGERIAN PROTESTS (A CASE STUDY OF ENDBADGOVERNANCE PROTEST IN NIGERIA)
IMPACT OF FINTECH ON THE GROWTH OF SMES IN NIGERIA (A CASE STUDY OF PAYSTACK)