Some Special Fields of Data Security
In: Symposium for Young Researchers 2007: Proceedings
AbstractOur age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them.This is a permanent problem of enterprises and private persons as well. The technical prerequisites are given not only for eavesdropping the data of others but for securing our data as well. In this paper I show a possible and a low cost technical solution for a typical situation: how one can hide the digital footprints of his or her browsing the internet.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
This chapter was published in: Anna Francsovics (ed.) Symposium for Young Researchers 2007: Proceedings, , pages 91-97, 2007.
This item is provided by Óbuda University, Keleti Faculty of Business and Management in its series Proceedings Papers of Business Sciences: Symposium for Young Researchers (FIKUSZ) 2007 with number 91-97.
SSH; portforward; privacy; data security;
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alexandra Vécsey).
If references are entirely missing, you can add them using this form.