Sunday, August 11, 2019

Research proposal Essay Example | Topics and Well Written Essays - 1000 words - 5

Research proposal - Essay Example The study will therefore focus on establishing various formal verification and security methods. The methods are expected to play a crucial role in the minimization of computer crimes and information wars. Formal verification and security are of great importance in the growth of hard ware and software systems. In the past years, there has been a tremendous progress in both the speed and capacity of constraint technology. In the 19th century the percentage of computer crimes and information war were very low. This was greatly attributed to lack of industrialization hence low technology advancement. However, in the 21st century, technology has drastically emerged amongst many societies in the world. Brake and Johnson (2001), states that technology has greatly advanced leading to computerization of various homestead and commercial based systems such as mobile phones, washing machine, automated teller machines among others. The increase in technology has led to emergence of various computer crimes and information wars hence the need for formal verification and security methods. Original methods and approaches are now being developed in order to protect the systems involved against attackers, to identify the attackers and to collect sensitive information so as to eliminate the threats. In the past, security protocols were designed and verified through informal techniques. The absence of formal verification led to security errors remaining undetected. Recently, emergence and presence of formal verification techniques have led to provision of a systematic way of discovering protocol flaws. Due to the increase in computer crimes, information wars and computer intrusions, the study purports to establish effective formal verification and security methods. The methods are expected to reduce computer crime rates in the world. The study also focuses on exploring possible applications of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.