О‘zbekistonrespublikasiaxborottexnologiyalari vakommunikatsiyalarinirivojlantirishvazirligi



Download 30,06 Mb.
bet2/4
Sana08.04.2022
Hajmi30,06 Mb.
#536415
1   2   3   4
Bog'liq
ingiliz tili mustaqil ish DI 11-21 guruh talabasi xalilov Firdavs

Therefore, there is a strong need to protect information from unauthorized access, intentional alteration, theft, loss and other criminal activities. However, society's desire for a high degree of automation makes it dependent on the level of security of the information technology used.

  • Therefore, there is a strong need to protect information from unauthorized access, intentional alteration, theft, loss and other criminal activities. However, society's desire for a high degree of automation makes it dependent on the level of security of the information technology used.
  • Information security
  • Information security is the observance of norms and requirements aimed at the protection of user information. protected
  • Comparative analysis of information threats and methods of combating them in cloud technologies
  • The role of software is very important in the era of rapid development of information technology. For the program to work properly, the personal computer must meet the minimum system requirements.

The Internet was modernized and server equipment developed. At the same time, the idea was to integrate computing systems into the program and use it as a single source. Since 2008, the word cloud technology has spread around the world. At first glance, "Cloud Technology" may seem incomprehensible: this model allows you to quickly, easily and efficiently use any system (servers, applications, storage systems and services). It is provided quickly and accurately, without any extra effort, only when connected to the network through the provider.

  • The Internet was modernized and server equipment developed. At the same time, the idea was to integrate computing systems into the program and use it as a single source. Since 2008, the word cloud technology has spread around the world. At first glance, "Cloud Technology" may seem incomprehensible: this model allows you to quickly, easily and efficiently use any system (servers, applications, storage systems and services). It is provided quickly and accurately, without any extra effort, only when connected to the network through the provider.

Download 30,06 Mb.

Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish