Please use this identifier to cite or link to this item: http://dspace.azjhpc.org/xmlui/handle/123456789/222
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAghayeva, Shabnam-
dc.date.accessioned2023-12-17T09:33:08Z-
dc.date.available2023-12-17T09:33:08Z-
dc.date.issued2023-05-11-
dc.identifier.urihttp://dspace.azjhpc.org/xmlui/handle/123456789/222-
dc.description.abstractThis article examines the information security techniques that are essential to protect the confidential information of companies, governments, and individuals from the growing number of hacking, data theft, malware, and other online attacks. It also examines cryptography, firewalls, intrusion detection, identity and access management, and other security measures. measures, including tools, techniques and strategies used to protect sensitive data from attack. The article also highlights information security issues and risks, as well as external risks such as targeted attacks and security vulnerabilities. Information security information is also shown, including having strong security policies, continuously monitoring systems and networks, and responding quickly to security incidents. The article provides recommendations for strengthening information security in an ever-changing technology environment, such as implementing comprehensive security measures as well as developing personalized and effective security. Some of the most common technical tools used to protect data are shown to include firewalls, antivirus, intrusion detection software, encryption systems, multi-factor authentication, virtualization, and network segmentation. was done. Multi-factor authentication requires two or more forms of authentication before accessing a system or application to increase security. Virtualization has been reported to help create isolated computing environments to protect sensitive systems and data.en_US
dc.language.isoenen_US
dc.publisherAzərbaycan Dövlət Neft və Sənaye Universitetien_US
dc.subjectinformationen_US
dc.subjectinformation securityen_US
dc.subjectattacksen_US
dc.subjecttechnical meansen_US
dc.titleTechnical means of information securityen_US
dc.typeBooken_US
dc.source.journaltitle1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGYen_US
dc.source.booktitle1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGYen_US
dc.source.volume1en_US
dc.source.issue1en_US
dc.source.beginpage296en_US
dc.source.endpage299en_US
dc.source.numberofpages4en_US
Appears in Collections:1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY

Files in This Item:
File Description SizeFormat 
Industy_4-296-299.pdf215.55 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.