logo
Asosiy
Kutubxona
Control access methods to the generated file objects in the information and communication systems
    image
    Daraja:
    Oliy ta‘lim
    Tur:
    Bitiruv malakaviy ishi
    Muallif:
    Makhmudov F.F.
    Nashr etilgan yili:
    2015
    Yaratilgan vaqti:
    03.09.2023
    0
    Every organization uses information, most are dependent on it. Information is an asset that, like other important business assets, is essential to your business and consequently needs to be suitably protected. This is especially important in the increasingly interconnected business environment, where information is now exposed to a growing number and a wider variety of threats and vulnerabilities. Causes of damage such as malicious code, computer hacking, and denial of service attacks have become more common, more ambitious, and increasingly sophisticated.