Mobility

Using Mono-Alphabetic Substitution to Secure Against Threats and Risk in Information Technology

Free registration required

Executive Summary

The awareness the world over on Information Technology (IT) is a welcome development but calls for great care and concern. This is so as there are out there, many people with evil minds who see nothing good that they would not capitalize on. There are persons who would want to create problems to make systems not workable while there are others who would want to steal or destroy such systems. This write-up therefore tries to analyze information technology systems, looking at all possible threats and risks and how to combat or make such systems secure. In doing this, very simple yet difficult to guess systems software are designed to check evil practices such that would-be risk or threat persons would find it difficult to use.

  • Format: PDF
  • Size: 75.06 KB