Methods of Data Collection

  • Sohail Hussain Master of Computer Applications (MCA),RV College of Engineering, Banglore, karnataka
Keywords: .

Abstract

With the increasing number of security threats and data breaches it’s very necessary to set up a security solution for any system. One can either pay someone to do it or do it himself. Both ways there is always a chance of missing out on something unless we have a perfect guide to tick the completed work. This article intends to do exactly that by putting light on all the factors which are needed to be considered while setting up any system. One may think that this is purely for business purposes but even personal rigs will benefit from this. This is because personal rigs are the ones who have users of different ages and understanding. From where to start and what to consider to what to choose and how much to pay (or do you need to pay) is what the article intents to deliver.

Downloads

Download data is not yet available.

References

.
Published
2020-01-22
How to Cite
Sohail Hussain. (2020). Methods of Data Collection. CYBERNOMICS, 1(6), 41-43. Retrieved from https://cybernomics.in/index.php/cnm/article/view/120