Hierarchy view
gondoskodik az ikt eszközök védelméről
Description
Code
S5.2.2
Description
Making use of tools and methods to protect and maximize security of ICT devices and information by controlling access, such as by requiring passwords, digital signatures, and biometric identification, and by protecting systems through the use of software.
Scope note
Examples: - Remove computer virus or malware form a computer - Implement a firewall - Use back-up and recovery tools
Fogalomazonosító URI
Fogalomazonosító URI
http://data.europa.eu/esco/skill/185c56ee-098f-46a1-af87-56337085da6fStatus