1 topic: living with a computer plan: Understanding of personal computer. Basic devices of a personal computer Additional devices of the personal computer



Yüklə 227,55 Kb.
səhifə10/19
tarix26.05.2023
ölçüsü227,55 Kb.
#113174
1   ...   6   7   8   9   10   11   12   13   ...   19
20 – Lessons Esonov Elbek

9 TOPIC:_______________

  • Computer security, cyber security or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft or damage to their hardware, software or electronic data, as well as to protect Misrepresenting the services they provide[1][2].
  • The IT security industry is expanding its reliance on wireless network standards such as computer systems, the Internet, Bluetooth, and Wi-Fi. It has become important due to the growth of smart devices including smartphones, televisions and various other devices. Devices that make up the Internet of Things (IoT). Cybersecurity is one of the most important issues today due to the complexity of information systems, both in terms of political use and technology. Its main purpose is to ensure system reliability, integrity and data confidentiality[3][4]. Since the advent of the Internet and in recent years, the concept of digital transformation and cybersecurity has become a familiar theme in our professional and personal lives. Technological changes in cyber security and cyber threats have been constant over the past 50 years. In the 1970s and 1980s, computer security was largely confined to academic regulations until the concept of the Internet emerged.
  • With the increase in connectivity here, computer viruses and network attacks have become more common. After the spread of viruses in the 1990s, the 2000s marked the institutionalization of cyber threats and cyber security.
  • A session organized by Willis Ware at the Spring Joint Computer Conference in April 1967, and the subsequent publication of the Ware Report, were groundbreaking in the history of computer security[5]. Ware's work intersects with material, cultural, political and social issues[5].
  • A 1977 NIST publication[6] introduced the "CIA Triad" of Confidentiality, Integrity, and Availability as a clear and simple way to describe key security objectives[7]. Although still relevant, many more developed frameworks have been proposed since then

Yüklə 227,55 Kb.

Dostları ilə paylaş:
1   ...   6   7   8   9   10   11   12   13   ...   19




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə