Sunday, May 5, 2019

Research proposal Essay Example | Topics and Well Written Essays - 1000 words - 5

Research proposal - Essay ExampleThe study will therefore focus on establishing various formal balk and security methods. The methods are expected to play a crucial role in the minimization of computing machine crimes and culture wars.Formal verification and security are of great richness in the growth of hard ware and software systems. In the past years, there has been a terrible progress in both the speed and capacity of constraint engineering. In the 19th century the pct of estimator crimes and information war were very low. This was greatly attributed to lack of industrialization hence low technology advancement.However, in the 21st century, technology has drastically emerged amongst many societies in the world. Brake and Johnson (2001), states that technology has greatly move leading to computerization of various homestead and commercial based systems such as mobile phones, backwash machine, automated teller machines among others. The increase in technology has led to em ergence of various computer crimes and information wars hence the need for formal verification and security methods. Original methods and approaches are now being developed in order to protect the systems involved against attackers, to identify the attackers and to collect sensitive information so as to eliminate the threats.In the past, security protocols were designed and verified through informal techniques. The absence of formal verification led to security errors remaining undetected. Recently, emergence and presence of formal verification techniques have led to formulation of a systematic way of discovering protocol flaws.Due to the increase in computer crimes, information wars and computer intrusions, the study purports to establish effective formal verification and security methods. The methods are expected to reduce computer crime rates in the world. The study also focuses on exploring possible applications of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.