Please use this identifier to cite or link to this item: http://dspace.azjhpc.org/xmlui/handle/123456789/189
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSardarov, Yagub-
dc.contributor.authorRahimov, Nadir-
dc.date.accessioned2023-12-14T08:35:52Z-
dc.date.available2023-12-14T08:35:52Z-
dc.date.issued2023-05-11-
dc.identifier.urihttp://dspace.azjhpc.org/xmlui/handle/123456789/189-
dc.description.abstractAs the evaluation of information assets increases, the need to protect them becomes even more crucial. Failure to safeguard the enterprise's information resources or to implement adequate security measures can result in serious consequences. The focus is on the risks that can obstruct the primary information resources of the enterprise in its operation. At the same time, the discussion alsoaddresses the more effective and cost-efficient means of mitigating the identified risks. In our modern digital era, protecting information resources is crucial for every company. This necessitates the implementation of a strong security policy and measures to protect sensitive information from cyber threats such as hacking, malware, and phishing attacks. To effectively protect information resources, companies should regularly perform risk assessments, develop comprehensive security policies and procedures, and utilize various security technologies such as firewalls, intrusion detection systems, and encryption tools. Furthermore, companies should ensure that their employees receive cybersecurity training and understand the risks associated with managing information. By implementing appropriate security policies, procedures, and technologies, companies can protect the confidentiality, integrity, and availability of their information resources while also maintaining their reputation and compliance with regulatory requirements. After analyzing the main security measures, encryption algorithms are identified, and then the security program of the enterprise is elaborated.en_US
dc.language.isoenen_US
dc.publisherAzərbaycan Dövlət Neft və Sənaye Universitetien_US
dc.subjectSecurity measuresen_US
dc.subjectencryption algorithmsen_US
dc.subjectprotectionen_US
dc.subjectsecurity policiesen_US
dc.titleProtectıon Of Enterprıse Informatıonen_US
dc.typeBooken_US
dc.source.journaltitle1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGYen_US
dc.source.booktitle1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGYen_US
dc.source.volume1en_US
dc.source.issue1en_US
dc.source.beginpage46en_US
dc.source.endpage49en_US
dc.source.numberofpages4en_US
Appears in Collections:1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY

Files in This Item:
File Description SizeFormat 
Industy_4-46-49.pdf339.79 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.