SlideShare a Scribd company logo
1 of 1
Download to read offline
OPERATIONAL SECURITY
Operational security in general is an element
related to many things. Cyber attacks may occur
when a system is not working, in this case
operational security will work to ensure that cyber
attacks do not occur.
Network security measures are an example of this
type of cyber security. Communication networks
are one element that is vulnerable to cyber attacks.
The safety of the network for data exchange is
ensured through network security.
This element relates to measures to protect the
security of data stored in the cloud. For example,
security to avoid hijacking service traffic, hijacking
and misuse of data.
COST-EFFECTIVENESS
One of the major reasons behind is the rise of refurbished
laptops sales in the recent years is their affordability. While
brand new laptops can sometimes burden for customer to
afford, but refurbished laptops are generally cheaper then
brand new laptops and they are now more available to
consumers.
ENVIRONMENTAL BENEFITS
Cyber security aims to prevent all forms of cyber
attacks by increasing security in applications.
Encryption, input validation, authorization, and
session management are the most common
threats to software or applications.
NETWORK SECURITY
CLOUD SECURITY

More Related Content

Similar to The Rise of Refurbished Laptops Why they are gaining Popularity (Infographics)) (1).pdf

Secure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdfSecure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdf
NK Carpenter
 
Web App Sec Tisc
Web App Sec TiscWeb App Sec Tisc
Web App Sec Tisc
Aung Khant
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
sandeepsandy75
 

Similar to The Rise of Refurbished Laptops Why they are gaining Popularity (Infographics)) (1).pdf (20)

Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Security overview of cloud computing.pptx
Security overview of cloud computing.pptxSecurity overview of cloud computing.pptx
Security overview of cloud computing.pptx
 
Secure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdfSecure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdf
 
Web App Sec Tisc
Web App Sec TiscWeb App Sec Tisc
Web App Sec Tisc
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Network security
Network security Network security
Network security
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
 
Network security
Network securityNetwork security
Network security
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Bn 1023 demo network security
Bn 1023 demo  network securityBn 1023 demo  network security
Bn 1023 demo network security
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 

More from Used usedstore

More from Used usedstore (20)

Advantages and Customization of Refurbished Laptops
Advantages and Customization of Refurbished LaptopsAdvantages and Customization of Refurbished Laptops
Advantages and Customization of Refurbished Laptops
 
Ensuring Quality Testing Second Hand Laptops Before Purchase.pdf
Ensuring Quality Testing Second Hand Laptops Before Purchase.pdfEnsuring Quality Testing Second Hand Laptops Before Purchase.pdf
Ensuring Quality Testing Second Hand Laptops Before Purchase.pdf
 
Ensuring Quality Testing Second Hand Laptops Before Purchase.pdf
Ensuring Quality Testing Second Hand Laptops Before Purchase.pdfEnsuring Quality Testing Second Hand Laptops Before Purchase.pdf
Ensuring Quality Testing Second Hand Laptops Before Purchase.pdf
 
Unveiling the Hidden Gems Why Second Hand Laptops Reign Supreme.pdf
Unveiling the Hidden Gems Why Second Hand Laptops Reign Supreme.pdfUnveiling the Hidden Gems Why Second Hand Laptops Reign Supreme.pdf
Unveiling the Hidden Gems Why Second Hand Laptops Reign Supreme.pdf
 
Tips for Buying a Second Hand Laptop.pdf
Tips for Buying a Second Hand Laptop.pdfTips for Buying a Second Hand Laptop.pdf
Tips for Buying a Second Hand Laptop.pdf
 
How to Spot Scams When Buying Second Hand Laptops.pdf
How to Spot Scams When Buying Second Hand Laptops.pdfHow to Spot Scams When Buying Second Hand Laptops.pdf
How to Spot Scams When Buying Second Hand Laptops.pdf
 
Is It Time to Upgrade A Second Hand Laptop Buyer's Guide.pdf
Is It Time to Upgrade A Second Hand Laptop Buyer's Guide.pdfIs It Time to Upgrade A Second Hand Laptop Buyer's Guide.pdf
Is It Time to Upgrade A Second Hand Laptop Buyer's Guide.pdf
 
Benefits of Choosing a Second Hand Laptop.pdf
Benefits of Choosing a  Second Hand Laptop.pdfBenefits of Choosing a  Second Hand Laptop.pdf
Benefits of Choosing a Second Hand Laptop.pdf
 
Refurbished Laptops Unleashing Value and Savings.pdf
Refurbished Laptops Unleashing Value and Savings.pdfRefurbished Laptops Unleashing Value and Savings.pdf
Refurbished Laptops Unleashing Value and Savings.pdf
 
Refurbished Laptops Better Than Original.pdf
Refurbished Laptops Better Than Original.pdfRefurbished Laptops Better Than Original.pdf
Refurbished Laptops Better Than Original.pdf
 
The Advantages of Refurbished Laptops.pdf
The Advantages of Refurbished Laptops.pdfThe Advantages of Refurbished Laptops.pdf
The Advantages of Refurbished Laptops.pdf
 
Unlocking the Benefits of Refurbished Laptops.pdf
Unlocking the Benefits of Refurbished Laptops.pdfUnlocking the Benefits of Refurbished Laptops.pdf
Unlocking the Benefits of Refurbished Laptops.pdf
 
Are Second Hand Laptops Worth It .pdf
Are Second Hand Laptops Worth It .pdfAre Second Hand Laptops Worth It .pdf
Are Second Hand Laptops Worth It .pdf
 
Maintaining and Extending the Lifespan of Your Refurbished Laptop.pdf
Maintaining and Extending the Lifespan of Your Refurbished Laptop.pdfMaintaining and Extending the Lifespan of Your Refurbished Laptop.pdf
Maintaining and Extending the Lifespan of Your Refurbished Laptop.pdf
 
Are Refurbished Laptops Long Lasting.pdf
Are Refurbished Laptops Long Lasting.pdfAre Refurbished Laptops Long Lasting.pdf
Are Refurbished Laptops Long Lasting.pdf
 
A Comprehensive Guide What to Check When Buying a Refurbished Laptop.pdf
A Comprehensive Guide What to Check When Buying a Refurbished Laptop.pdfA Comprehensive Guide What to Check When Buying a Refurbished Laptop.pdf
A Comprehensive Guide What to Check When Buying a Refurbished Laptop.pdf
 
What to Check When Buying a Refurbished Laptop.pdf
What to Check When Buying a Refurbished Laptop.pdfWhat to Check When Buying a Refurbished Laptop.pdf
What to Check When Buying a Refurbished Laptop.pdf
 
Finding refurbished laptops in Hyderabad .pdf
Finding refurbished laptops in Hyderabad .pdfFinding refurbished laptops in Hyderabad .pdf
Finding refurbished laptops in Hyderabad .pdf
 
The Smart Choice Unraveling the Benefits of Refurbished Laptops.pdf
The Smart Choice Unraveling the Benefits of Refurbished Laptops.pdfThe Smart Choice Unraveling the Benefits of Refurbished Laptops.pdf
The Smart Choice Unraveling the Benefits of Refurbished Laptops.pdf
 
The Smart Choice Unraveling the Benefits of Refurbished Laptops.pdf
The Smart Choice Unraveling the Benefits of Refurbished Laptops.pdfThe Smart Choice Unraveling the Benefits of Refurbished Laptops.pdf
The Smart Choice Unraveling the Benefits of Refurbished Laptops.pdf
 

Recently uploaded

Preview-Product -ZenBasket your ecommerce solution
Preview-Product -ZenBasket your ecommerce solutionPreview-Product -ZenBasket your ecommerce solution
Preview-Product -ZenBasket your ecommerce solution
Deborahnich
 
4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...
4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...
4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...
mikehavy0
 
MARCOM Proposal for ACFC Vietnam May 2024
MARCOM Proposal for ACFC Vietnam May 2024MARCOM Proposal for ACFC Vietnam May 2024
MARCOM Proposal for ACFC Vietnam May 2024
William Do
 

Recently uploaded (9)

Jakub Krolikowski (Mirakl), Deja Horvat Zupanc (Big Bang).pdf
Jakub Krolikowski (Mirakl), Deja Horvat Zupanc (Big Bang).pdfJakub Krolikowski (Mirakl), Deja Horvat Zupanc (Big Bang).pdf
Jakub Krolikowski (Mirakl), Deja Horvat Zupanc (Big Bang).pdf
 
CAS 5449-12-7 BMK Powder High quality seller
CAS 5449-12-7 BMK Powder High quality sellerCAS 5449-12-7 BMK Powder High quality seller
CAS 5449-12-7 BMK Powder High quality seller
 
Preview-Product -ZenBasket your ecommerce solution
Preview-Product -ZenBasket your ecommerce solutionPreview-Product -ZenBasket your ecommerce solution
Preview-Product -ZenBasket your ecommerce solution
 
Steel door malappuram contact number and price list with catalogue
Steel door malappuram contact number and price list with catalogueSteel door malappuram contact number and price list with catalogue
Steel door malappuram contact number and price list with catalogue
 
4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...
4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...
4. ☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Muscat...
 
MARCOM Proposal for ACFC Vietnam May 2024
MARCOM Proposal for ACFC Vietnam May 2024MARCOM Proposal for ACFC Vietnam May 2024
MARCOM Proposal for ACFC Vietnam May 2024
 
Báo cáo EBI về thương mại điện tử 2024 ENG.pdf
Báo cáo EBI về thương mại điện tử 2024 ENG.pdfBáo cáo EBI về thương mại điện tử 2024 ENG.pdf
Báo cáo EBI về thương mại điện tử 2024 ENG.pdf
 
Netherlands Holland Stock CAS 5449-12-7 BMK Glycidic
Netherlands Holland Stock CAS 5449-12-7 BMK GlycidicNetherlands Holland Stock CAS 5449-12-7 BMK Glycidic
Netherlands Holland Stock CAS 5449-12-7 BMK Glycidic
 
Supermarket Floral Ad Roundup- Week 20 2024.pdf
Supermarket Floral Ad Roundup- Week 20 2024.pdfSupermarket Floral Ad Roundup- Week 20 2024.pdf
Supermarket Floral Ad Roundup- Week 20 2024.pdf
 

The Rise of Refurbished Laptops Why they are gaining Popularity (Infographics)) (1).pdf

  • 1. OPERATIONAL SECURITY Operational security in general is an element related to many things. Cyber attacks may occur when a system is not working, in this case operational security will work to ensure that cyber attacks do not occur. Network security measures are an example of this type of cyber security. Communication networks are one element that is vulnerable to cyber attacks. The safety of the network for data exchange is ensured through network security. This element relates to measures to protect the security of data stored in the cloud. For example, security to avoid hijacking service traffic, hijacking and misuse of data. COST-EFFECTIVENESS One of the major reasons behind is the rise of refurbished laptops sales in the recent years is their affordability. While brand new laptops can sometimes burden for customer to afford, but refurbished laptops are generally cheaper then brand new laptops and they are now more available to consumers. ENVIRONMENTAL BENEFITS Cyber security aims to prevent all forms of cyber attacks by increasing security in applications. Encryption, input validation, authorization, and session management are the most common threats to software or applications. NETWORK SECURITY CLOUD SECURITY