The concept of information security and methods of information security



Download 13,26 Kb.
Sana03.01.2022
Hajmi13,26 Kb.
#316539
Bog'liq
ingiliz


The concept of information security and methods of information security

Rapidly evolving information and communication technologies are making significant changes in all aspects of our daily lives. Nowadays, the term "information" is often used as a special trademark that can be bought, sold, or exchanged for another product. At the same time, the cost of information is often hundreds or thousands of times higher than the cost of the computer system in which it is located. Therefore, there is a strong need to protect information from unauthorized access, intentional alteration, theft, loss and other criminal activities. However, society's desire for a high degree of automation makes it dependent on the level of security of the information technology used.

The concept of information security and methods of information security

Rapidly evolving information and communication technologies are making significant changes in all aspects of our daily lives. Nowadays, the term "information" is often used as a special trademark that can be bought, sold, or exchanged for another product. At the same time, the cost of information is often hundreds or thousands of times higher than the cost of the computer system in which it is located. Therefore, there is a strong need to protect information from unauthorized access, intentional alteration, theft, loss and other criminal activities. However, society's desire for a high degree of automation makes it dependent on the level of security of the information technology used.

Information security

Information security is the observance of norms and requirements aimed at the protection of user information. protected



Comparative analysis of information threats and methods of combating them in cloud technologies

The role of software is very important in the era of rapid development of information technology. For the program to work properly, the personal computer must meet the minimum system requirements. The Internet was modernized and server equipment developed. At the same time, the idea was to integrate computing systems into the program and use it as a single source. Since 2008, the word cloud technology has spread around the world. At first glance, "Cloud Technology" may seem incomprehensible: this model allows you to quickly, easily and efficiently use any system (servers, applications, storage systems and services). It is provided quickly and accurately, without any extra effort, only when connected to the network through the provider.
Download 13,26 Kb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish