6. it security and safety



Download 23,34 Kb.
bet1/3
Sana16.01.2023
Hajmi23,34 Kb.
#899840
  1   2   3
Bog'liq
6. IT security and safety


6. IT security and safety
The first self-propagating computer worm was created in 1989, computer viruses appeared in the 1990s, and by the late 2000s, cybercriminals were targeting credit cards. For decades, security teams have been battling to keep computer networks and end-users safe from cyber threats, but for many, the term IT security can still be a little confusing. 
IT security defined 
In our hyper-connected, online world, the phrase IT security is often used interchangeably with cybersecurity and information security (infosec).
While there are similarities and occasions where one term can be used in place of the other, there are also marked differences between them. The first step to understanding what IT security is and why it’s important is to recognize these differences.
Sponsored Links


If You Need to Kill Time on Your Computer, this City-Building Game is a Must-Have. No Install.Forge of Empires - Free Online GameSign Up
Cybersecurity measures protect digital data from third-party attacks by cybercriminals via the internet.
RECOMMENDED VIDEOS FOR YOU...
CLOSE
0 seconds of 4 minutes, 39 secondsVolume 0%
PLAY SOUND
Infosec, at a base level, is the protection of both physical and electronic data, but the term is often expanded to cover other security concerns too. For example, infosec can also be used to describe the measures a company might take to protect its legal and financial interests by ensuring compliance with data protection laws, such as the EU’s General Data Protection Regulation (GDPR). 
IT security incorporates both cybersecurity and infosec but refers specifically to the protection of digital data and the security maintenance of the computer systems and networks that store it. 
The term IT security covers internal and external threats and is commonly used to describe the strategies deployed to safeguard digital data from attack at every point of an organization’s IT infrastructure, from company databases to end-user email accounts.

Download 23,34 Kb.

Do'stlaringiz bilan baham:
  1   2   3




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish