WAYS TO PROTECT INFORMATION

Authors

  • Beknazarova Saida Safibullayevna Tashkent University of Information Technologies named after Muhammad Al- Khwarizmi, 105, A. Temur,
  • Absamitov Bekhruz Tashkent University of Information Technologies named after Muhammad Al- Khwarizmi, 105, A. Temur,

Keywords:

specialized, risk, computer systems, hardware, devices

Abstract

Data in computer systems is at risk of loss due to malfunction or destruction of equipment, as well as the risk of theft. Methods of information protection include the use of hardware and devices, as well as the introduction of specialized hardware and software.

Downloads

Published

2021-10-23

Issue

Section

Articles

Most read articles by the same author(s)