WAYS TO PROTECT INFORMATION
Keywords:
specialized, risk, computer systems, hardware, devicesAbstract
Data in computer systems is at risk of loss due to malfunction or destruction of equipment, as well as the risk of theft. Methods of information protection include the use of hardware and devices, as well as the introduction of specialized hardware and software.
Downloads
Published
2021-10-23
Issue
Section
Articles
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
WAYS TO PROTECT INFORMATION. (2021). Conferencea , 41-42. https://conferencea.org/index.php/conferences/article/view/45