6 Questions 25 Answers 0 Followers
Questions related from Tadiwa Elisha Nyamasvisva
With most enterprise resources being hosted on the cloud, users tend not to be very aware of online security etiquette. This leaves the organisation's resources vulnerable to adversary attacks....
27 November 2022 322 6 View
Many researchers have fallen victim to predatory journals and conferences that openly advertise their journals online and feed unsuspecting desperate authors with wrong or fake information. Many...
09 August 2021 8,545 6 View
The hype these days is about Micro-Credentials offered mostly online. Can micro-credentials and professional certifications replace university qualifications or just complement university...
01 January 1970 3,408 8 View
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down...
01 January 1970 7,324 4 View
In most cases for academics - researchers are rated according to their impact on publications. Researchers must have the three Rs: Relevance, Respected and Referred to. To what extent do you agree...
01 January 1970 989 4 View
Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual...
01 January 1970 5,663 5 View