Skip to main content
There is a temporary issue on this page. Please, try later. We apologise for this inconvenience.

Show filters

Hide filters

حماية أجهزة تكنولوجيا المعلومات والاتصالات

Description

Description

Making use of tools and methods to protect and maximize security of ICT devices and information by controlling access, such as by requiring passwords, digital signatures, and biometric identification, and by protecting systems through the use of software.

Scope note

Examples: - Remove computer virus or malware form a computer - Implement a firewall - Use back-up and recovery tools

Relationships