8-lecture
Cybersecurity
Every source of information, organization, or whether the user's computer server, network equipment must be protected from all types of threats.
File system, network, etc. protection must be protected due to their methods, the implementation of this article, we will be not much different.
However, it is understood that it is impossible to provide absolute protection.
However, we must remember that a high level of security for the user, the system is user-friendly, especially because it is expensive and therefore leads to the deterioration of the protection of the human factor.
As an example, we are sensitive to excessive complexity of the user, etc. Write a piece of paper glued to the monitor, keyboard, and you need to remember that fact.
There are a wide range of information and software to solve security problems.
Қауіпсіздік – security
Желі қауіпсіздік – network Security
Ақпараттық қауіпсіздік – information Security
Аппараттық қауіпсіздік – Security hardware
Бағдарламалық қауіпсіздік – software Security
Пароль - password
Достарыңызбен бөлісу: |