Full Article: PDF
Scientific Object Identifier: http://s-o-i.org/1.1/TAS-02-118-13
DOI: https://dx.doi.org/10.15863/TAS.2023.02.118.13
Language: English
Citation: Kojalepesov, S. S. (2023). Threats to information and communication technologies, information security policy. ISJ Theoretical & Applied Science, 02 (118), 90-92. Soi: http://s-o-i.org/1.1/TAS-02-118-13 Doi: https://dx.doi.org/10.15863/TAS.2023.02.118.13 |
Pages: 90-92
Published: 28.02.2023
Abstract: The article deals with weaknesses of the object are identified, which do not provide sufficient protection by existing means of counter-impact. Thus, the design and implementation of a security system to ensure effective protection of information in a computer network should be carried out in three stages: risk analysis; implementation of the security policy; security policies.
Key words: information, multimedia, systematic policy, implementation, weaknesses.
|