Posts

Showing posts from April, 2023

ESSAY (CONCLUSION & REFERENCES) The privacy and security of smart cities

Image
  ]

ESSAY (MAIN BODY) The Privacy and Security of smart cities

Image
 

ESSAY (INTRODUCTION) The Privacy and Security of smart cities

Image
This essay discuss the importance of data security  Reference(s): Ismagilova. E., Hughes, L., Rana, N.P. and Dwivedi, Y.K, 2020. Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework. Information Systems Frontiers, pp.1-22. Available at: Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework I SpringerLink, (Last Accessed 2ath of April 2023]  

MAJOR PROJECT THEME

Image
  Operating systems  These are some information of Operating system below; One of the fundamental pieces of software that runs on hardware to enable human interaction with it so they may submit commands (input) and get results is the operating system (OS). (Hussain, B 2017). (Hussain, 2017) How Operating system came to existence (s): The Operating system's history is separated into Four generations. Let us go over each one in depth in the parts that follow: THE FIRST GENERATION: (1940s to early 1950s) In the 1940s, when electronic computers were initially developed, they lacked an operating system. THE SECOND GENERATION: (1955- 1965 Transistors and Batch systems) the first operating system, knowns as OS, was developed by General Motors for IBMS's 701 machine in the early 1950s. Because data was transferred in groups, operating systems in 1950s were known as single stream batch processing systems. THE THIRD GENERATION: (1965-1980) Operating systems designers were able...

INITIAL IDEA 2

Image
Initial idea 2   I'm interested in learning more about data security research and how to secure passwords for accounts while I do my study on cyber security. On the other side, data security refers to the safeguarding of computer systems and networks from online criminals who might harm users' electronic data, software, or hardware. Learning how to select a safe password is crucial for cyber security students since it is the key to the digital kingdom (technology), which needs to be carefully guarded. There are variety of ways to secure a password which are:  The user should avoid using the same password all the time in difference accounts. The user should not use phone number for password, birth date, addresses, because it can easily be hacked. Make a password of at least 9 characters. A unique combination of upper and lower letters, symbols and numbers. For example (iloveAllah@12) You can also use special characters. These are some information of Data security below: Protec...

INITIAL IDEA 1

Image
 initial idea 1  I'm interested in learning more about  This research, (Ethical hacking). I want to expand my knowledge by stepping into this research and it would be all about: Ethical hacking? What do ethical hackers do? Benefits of ethical hackers? (Beau peters, 2020) What is Ethical hacking According to Kranz,(2021) An information security (infosec) professional who breaches a computer system, network, application, or other computing resource on behalf of its owners -- and with their authority -- is known as an ethical hacker, sometimes known as a white hat hacker. What do ethical hackers do According to Kranz,(2021) Ethical hackers assist businesses in identifying the IT security measures that are efficient, need to be updated, and have exploitable weaknesses. Following their evaluation of a company's networks, ethical hackers inform the top executives of any weak points, which may include a deficiency in password encryption, unsecured apps, or exposed systems using ...

SOFTWARE/HARDWARE SKILLS

 I have used Website Wix, draw.io, word, excel and I have never engaged in any programming language because this is my first time, well I have Used special hardware in e-commerce computing such as website Wix, draw.io, excel. but I would love to learn new things hopefully in this module (computer skills and research) I would learn so many things and it would be great. I can use website Wix to sell my products. and the website Wix will help me in future such as online business. Thank you! 

INTRODUCTION POST

Image
In this  post I will be introducing myself:  I choose De Montfort university because it is one of the best universities in UK and it offers high quality of education for international students. De Montfort university attracted me since day 1 because it is one of the best ranking universities in UK. My course title in De Montfort university is cyber-security. The compulsory modules are English, problem solving and programming, computer skills and research and the optional are Study skills and e commerce computing. I am mostly interested in English, e-commerce computing, and study skills. My goal after my university is joining pilot training school because I always wanted to become a commercial pilot. the skills that DMU have are a lot but with those skills I will be able to learn new things,  understand and inspire other students, in ten years I see myself as a female pilot (captain Fatima). Thank you.

WELCOME

Image
    Hello, my Name is Fatima Adamu Abubakar. This Blog is going to be on Computer skills and Research and my tour and journey into Computer skills and Research is where I will take a look at the things that is related to Computer skills and Research. I am from Nigeria (Katsina). My hobby is reading.  Because I love coding and solving problems. DMUIC has been one of the best colleges for international student's so far.