Konferensiyasi



Yüklə 1,48 Mb.
Pdf görüntüsü
səhifə14/38
tarix23.07.2023
ölçüsü1,48 Mb.
#119845
1   ...   10   11   12   13   14   15   16   17   ...   38
63ed0704130b8 19 respublika ilmiy onlayn 10-TA

III.
 
RESULTS 
Another weakness of information security is the role of security policy in current 
corporate governance policy. Of course, when starting a business, every leader or 
management not only agrees with the above considerations, but also that security policy is 
an integral part of management, in short, all the requirements and conditions necessary for 
information security, but more (usually wholeheartedly) promises, but in the course of the 
work this problem is pushed to the ranks of the secondary, and this continues until there is 
an emergency, a great loss. Now, we, the security guards and the authorities, will be the first 
to appear on the scene (because the mother does not give milk if the baby does not cry!). 
With that in mind, it's good to know that being too humble and "polite" in dealing with 
management can be harmful. 
IV.
 
DISCUSSION 
We've looked at the indirect weaknesses of information technology above, and now 
let's discuss their immediate weaknesses. As we have seen, the share of unintentional 
behavior in system failures is very high. Because the system is not a single user, there are 
usually several users on the list whose content changes frequently. Depending on the 
characteristics of the mood, health or mood, even an experienced consumer can work with 
different levels of productivity or diligence.
V.
 
CONCLUSION 
Another vulnerability is software bugs, especially system and operating system errors. 
For example, the National Infrastructure Protection Center (NIPC) of the United States on 
June 21, 1999 From July 3 to July 16 this year, there were nine problems with the software, 


“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 

Yüklə 1,48 Mb.

Dostları ilə paylaş:
1   ...   10   11   12   13   14   15   16   17   ...   38




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə