A Study on Green Computing: The Future and Eco-Friendly Technology

ALLYSA ASHLEY M. PALAMING

Abstract


In this paper, it includes the basic leadership in numerous levels and different time scales, given the constrained assets accessible to both noxious assailants and managers protecting organized frameworks. Information security is the extraordinary basic figure guaranteeing the transmission of data by means of the system. In this paper, we learn about different sorts of assaults on system security and how to deal with or keep this assault. There is more system safety effort to shield the information from assailants like antivirus programming, firewalls, cryptography and so on. Arrange security is a testing issue because of the intricacy of hidden equipment, programming, and system interdependencies. 


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org