Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 44
2.4.3 Data-Based Threats
ОглавлениеData securing methods consists of five qualities in terms of “confidentiality, integrity, availability, controllability, and non-repudiation”.