Skip to main content
Query

6.1: Utangulizi

  • Page ID
    164861
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    Kama kompyuta na vifaa vingine vya digital vimekuwa muhimu kwa biashara na biashara, pia zimezidi kuwa lengo la mashambulizi. Kwa kampuni au mtu binafsi kutumia kifaa cha kompyuta kwa ujasiri, lazima kwanza wahakikishwe kwamba kifaa hakiathiriwa kwa njia yoyote na kwamba mawasiliano yote yatakuwa salama. Sura hii inaangalia dhana za msingi za usalama wa mifumo ya habari na kujadili baadhi ya hatua ambazo zinaweza kuchukuliwa ili kupunguza vitisho vya usalama. Sura inaanza na maelezo ya jumla yanayolenga jinsi mashirika yanaweza kukaa salama. Hatua kadhaa tofauti ambazo kampuni inaweza kuchukua ili kuboresha usalama zitajadiliwa. Hatimaye, utaangalia orodha ya tahadhari za usalama ambazo watu wanaweza kuchukua ili kupata mazingira yao binafsi ya kompyuta.