Abstract: Nowadays, computer and network system maintenance is just as important as their protection. Grow into the network systems that are posted on many different websites with payment function and this is seen as websites needed sensitive information and are important to any organization. Viruses represent one of the most successful ways to attack these systems and their use is inevitably part of the computer business worldwide. The use of identification and/or verification must be protected by the recommendable antivirus software, firewalls etc as well as by multiple other technologies created to protect the trinity of information security: confidentiality, integrity and availability. There is no specific standardized procedure for designing a secure network. Network security must be tailored to the current organization needs and achieve the appropriate protection required. In this article we examine and summarize the most popular and successful means of protections used by organizations as well as by individuals.
Publication Year: 2020
Publication Date: 2020-10-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 20
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot