z-logo
open-access-imgOpen Access
Methodology for ensuring computer security for vulnerable systems
Author(s) -
Opris Violeta Nicoleta
Publication year - 2020
Publication title -
scientific bulletin
Language(s) - English
Resource type - Journals
eISSN - 2392-8956
pISSN - 1454-864X
DOI - 10.21279/1454-864x-20-i2-025
Subject(s) - confidentiality , computer security , computer science , cloud computing , information security , process (computing) , event (particle physics) , internet privacy , physics , quantum mechanics , operating system
Risk assessment is a process that provides cloud users with useful data for understanding the impact. We define a security incident as an event that attempts unauthorized access to databases. It is similar to an attack on the integrity and confidentiality of information.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here