Ubiquity of English plan: 1 Ubiquity of English


Examples of Present (Root ) form of verb



Yüklə 210,54 Kb.
səhifə3/24
tarix22.03.2024
ölçüsü210,54 Kb.
#180297
1   2   3   4   5   6   7   8   9   ...   24
english 30 mavzu

Examples of Present (Root ) form of verb:

  • Nisha love watching movies with my friends. (Base form – love)

  • Preeti finish my homework before 6 p.m. everyday.(Base form – finish)

  • Chinki play really well. (Root verb – play)

2. Simple past form of a verb
The simple past form of the verb is a verb used to refer to or denote any action that took place in the past or the work that is already done. This form of the verb is also known as the ‘V2’ form of the verb. This form of verb is generally formed by adding (-ed)/(-d) at the end of the main or root verb. 

What is Information Security?


Information security is the practice of protecting information by mitigating information risks. It involves the protection of information systems and the information processed, stored and transmitted by these systems from unauthorized access, use, disclosure, disruption, modification or destruction. This includes the protection of personal information, financial information, and sensitive or confidential information stored in both digital and physical forms. Effective information security requires a comprehensive and multi-disciplinary approach, involving people, processes, and technology.
Information Security is not only about securing information from unauthorized access. Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be a physical or electronic one. Information can be anything like Your details or we can say your profile on social media, your data on mobile phone, your biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media, etc.
During First World War, Multi-tier Classification System was developed keeping in mind the sensitivity of the information. With the beginning of Second World War, formal alignment of the Classification System was done. Alan Turing was the one who successfully decrypted Enigma Machine which was used by Germans to encrypt warfare data.
Effective information security requires a comprehensive approach that considers all aspects of the information environment, including technology, policies and procedures, and people. It also requires ongoing monitoring, assessment, and adaptation to address emerging threats and vulnerabilities.
Why we use Information Security?
We use information security to protect valuable information assets from a wide range of threats, including theft, espionage, and cybercrime. Information security is necessary to ensure the confidentiality, integrity, and availability of information, whether it is stored digitally or in other forms such as paper documents. Here are some key reasons why information security is important:
Protecting sensitive information: Information security helps protect sensitive information from being accessed, disclosed, or modified by unauthorized individuals. This includes personal information, financial data, and trade secrets, as well as confidential government and military information.


Yüklə 210,54 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   24




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə