Please use this identifier to cite or link to this item:
http://dspace.azjhpc.org/xmlui/handle/123456789/189
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sardarov, Yagub | - |
dc.contributor.author | Rahimov, Nadir | - |
dc.date.accessioned | 2023-12-14T08:35:52Z | - |
dc.date.available | 2023-12-14T08:35:52Z | - |
dc.date.issued | 2023-05-11 | - |
dc.identifier.uri | http://dspace.azjhpc.org/xmlui/handle/123456789/189 | - |
dc.description.abstract | As the evaluation of information assets increases, the need to protect them becomes even more crucial. Failure to safeguard the enterprise's information resources or to implement adequate security measures can result in serious consequences. The focus is on the risks that can obstruct the primary information resources of the enterprise in its operation. At the same time, the discussion alsoaddresses the more effective and cost-efficient means of mitigating the identified risks. In our modern digital era, protecting information resources is crucial for every company. This necessitates the implementation of a strong security policy and measures to protect sensitive information from cyber threats such as hacking, malware, and phishing attacks. To effectively protect information resources, companies should regularly perform risk assessments, develop comprehensive security policies and procedures, and utilize various security technologies such as firewalls, intrusion detection systems, and encryption tools. Furthermore, companies should ensure that their employees receive cybersecurity training and understand the risks associated with managing information. By implementing appropriate security policies, procedures, and technologies, companies can protect the confidentiality, integrity, and availability of their information resources while also maintaining their reputation and compliance with regulatory requirements. After analyzing the main security measures, encryption algorithms are identified, and then the security program of the enterprise is elaborated. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Azərbaycan Dövlət Neft və Sənaye Universiteti | en_US |
dc.subject | Security measures | en_US |
dc.subject | encryption algorithms | en_US |
dc.subject | protection | en_US |
dc.subject | security policies | en_US |
dc.title | Protectıon Of Enterprıse Informatıon | en_US |
dc.type | Book | en_US |
dc.source.journaltitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.booktitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.volume | 1 | en_US |
dc.source.issue | 1 | en_US |
dc.source.beginpage | 46 | en_US |
dc.source.endpage | 49 | en_US |
dc.source.numberofpages | 4 | en_US |
Appears in Collections: | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Industy_4-46-49.pdf | 339.79 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.