Linked e-resources
Details
Table of Contents
Data protection and data security
How computers communicate with each other
What can happen to data files
Technical threats
Dangerous software
Dangers from mobile data carriers and devices
Telephone system as a source of danger
Destruction of data
Securing data
Encryption
Security of websites
Common threats to IT security
Identification of computers and IP addresses
Firewalls
Routers
Configuration of protection systems
The demilitarized zone
Organizational data protection.
How computers communicate with each other
What can happen to data files
Technical threats
Dangerous software
Dangers from mobile data carriers and devices
Telephone system as a source of danger
Destruction of data
Securing data
Encryption
Security of websites
Common threats to IT security
Identification of computers and IP addresses
Firewalls
Routers
Configuration of protection systems
The demilitarized zone
Organizational data protection.