This paper talks about data security which is the protection of data from unauthorized access. It defines data insecurity as unauthorized access and collection of data with or without the users’ knowledge. It explains how data are collected from the internet and through applications some of which are; Adware, Spyware, Browser Hijacking Software, Browsing History, In-Website Browsing History. It goes further to list what data can be collected by a website or an application with pictorial examples. This paper identifies the methods of preventing data breach, for example; Using internet anonymously, Authentication, Elimination of Third-Party Cookies, Use of Privacy Extensions or Add-Ons, Use of safe search engines, Encryption method and Firewa...
Privacy and Data security are heating topic in the modern technologically advanced economy. Technolo...
What is information? Information is a resource, regardless of its presentation perceived by the per...
In the world of Internet nothing can be done without identifying the user. Internet is borderless an...
Internet plays a vital role in our day today life. Data security in web application has become very ...
Internet plays a vital role in our day today life. Data security in web application has become very...
This research basically centers on the point of website/web application security. The prime agenda o...
Cyber Security is an important and major concern in today’s age. The term Cyber is gaining popularit...
The Internet is a place where you can express your opinion, share experiences, communicate with frie...
Computer security deals with the managerial procedures and technological safeguards applied to compu...
Abstract This article gives general information about data security on the Internet, summarizes top...
Abstract Having observed carefully the dynamics of e- activity and technology in business, finance a...
Computer security deals with the managerial procedures and technological safeguards applied to compu...
Data protection, data privacy, and information privacy are all terms defined as the process of prote...
This article focuses on how to revolutionize ICT in Rwanda, this study examined how security, data, ...
The collection of personal data in cyberspace is an invasion of personal privacy. Data collection te...
Privacy and Data security are heating topic in the modern technologically advanced economy. Technolo...
What is information? Information is a resource, regardless of its presentation perceived by the per...
In the world of Internet nothing can be done without identifying the user. Internet is borderless an...
Internet plays a vital role in our day today life. Data security in web application has become very ...
Internet plays a vital role in our day today life. Data security in web application has become very...
This research basically centers on the point of website/web application security. The prime agenda o...
Cyber Security is an important and major concern in today’s age. The term Cyber is gaining popularit...
The Internet is a place where you can express your opinion, share experiences, communicate with frie...
Computer security deals with the managerial procedures and technological safeguards applied to compu...
Abstract This article gives general information about data security on the Internet, summarizes top...
Abstract Having observed carefully the dynamics of e- activity and technology in business, finance a...
Computer security deals with the managerial procedures and technological safeguards applied to compu...
Data protection, data privacy, and information privacy are all terms defined as the process of prote...
This article focuses on how to revolutionize ICT in Rwanda, this study examined how security, data, ...
The collection of personal data in cyberspace is an invasion of personal privacy. Data collection te...
Privacy and Data security are heating topic in the modern technologically advanced economy. Technolo...
What is information? Information is a resource, regardless of its presentation perceived by the per...
In the world of Internet nothing can be done without identifying the user. Internet is borderless an...