Please use this identifier to cite or link to this item:
http://dspace.azjhpc.org/xmlui/handle/123456789/200
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sardarov, Yagub | - |
dc.contributor.author | Aliyeva, Nergiz | - |
dc.date.accessioned | 2023-12-14T09:58:01Z | - |
dc.date.available | 2023-12-14T09:58:01Z | - |
dc.date.issued | 2023-05-11 | - |
dc.identifier.uri | http://dspace.azjhpc.org/xmlui/handle/123456789/200 | - |
dc.description.abstract | Information security is the measures taken to protect against risks related to the use, collection, processing, transmission and storage of information. It ensures the protection of all kinds of information such as personal data, bank accounts, customer base, business data, medical data. Information security issues are one of the main problems of today's information technologies. This issue is given importance all over the world and many standards and measures are applied to protect information. These measures include technology measures such as encryption, network security, antivirus programs, firewalls and data backups to protect data. In addition, companies and organizations should adopt a policy focused on information security and instruct their employees on information security. Maintaining information security is basically about manually processing information and maintaining control over information for its accuracy and confidentiality. As a guarantee of information security, necessary measures should be taken to protect any information itself. If these precautions are not taken, the information remains unprotected and possible risks arise. With the development of information technologies, the increase in information security is also increasing. This gives us more security features, more technological measures and more secure information. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Azərbaycan Dövlət Neft və Sənaye Universiteti | en_US |
dc.subject | Collection | en_US |
dc.subject | processing | en_US |
dc.subject | transmission | en_US |
dc.subject | personal data | en_US |
dc.subject | bank accounts | en_US |
dc.subject | customer base | en_US |
dc.title | Methods of creating information security in enterprises | en_US |
dc.type | Book | en_US |
dc.source.journaltitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.booktitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.volume | 1 | en_US |
dc.source.issue | 1 | en_US |
dc.source.beginpage | 87 | en_US |
dc.source.endpage | 90 | en_US |
dc.source.numberofpages | 4 | en_US |
Appears in Collections: | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Industy_4-87-90.pdf | 127.38 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.