Auto saved by Logseq
This commit is contained in:
parent
1abe2f8246
commit
4a24d024a7
|
@ -2174,7 +2174,7 @@
|
||||||
- 科学家
|
- 科学家
|
||||||
- 工程师金钱
|
- 工程师金钱
|
||||||
- Technology Intellectual Property (Protection) The Vision (Where can the technology lead? Is there \na market for it) Personnel\nl Scientific leaders\nl Business managers\nl Fund Raisers\nl Scientists/Engineers Money
|
- Technology Intellectual Property (Protection) The Vision (Where can the technology lead? Is there \na market for it) Personnel\nl Scientific leaders\nl Business managers\nl Fund Raisers\nl Scientists/Engineers Money
|
||||||
- 创建高新企业的阶段\nThe stages for creating a hitech start-up
|
- 创建高新企业的阶段\nThe stages for creating a hitech start-up #flashcard
|
||||||
- 1.评估机会-产生、评估和提炼商业概念 \nassess the opportunities - generate, evaluate & \nrefine the business concept
|
- 1.评估机会-产生、评估和提炼商业概念 \nassess the opportunities - generate, evaluate & \nrefine the business concept
|
||||||
- 2.制定商业计划并决定合资企业的结构 \nDevelop the business plan and decide on the \nstructure of the venture
|
- 2.制定商业计划并决定合资企业的结构 \nDevelop the business plan and decide on the \nstructure of the venture
|
||||||
- 3.获得必要的资源和资金 \nAcquire the necessary resources and funding
|
- 3.获得必要的资源和资金 \nAcquire the necessary resources and funding
|
||||||
|
@ -2293,7 +2293,7 @@
|
||||||
- Authentication is :-> the process of validating the
|
- Authentication is :-> the process of validating the
|
||||||
id:: 648ae307-4640-478a-97cc-42102626dbb3
|
id:: 648ae307-4640-478a-97cc-42102626dbb3
|
||||||
identity of a registered user or process before
|
identity of a registered user or process before
|
||||||
enabling access to protected networks and systems.
|
enabling access to protected networks and systems. #flashcard
|
||||||
- Analogue
|
- Analogue
|
||||||
- signatures, handwriting, in person attestation,
|
- signatures, handwriting, in person attestation,
|
||||||
witnesses, notary
|
witnesses, notary
|
||||||
|
@ -2321,7 +2321,7 @@
|
||||||
policy and regulation, including the prevention of
|
policy and regulation, including the prevention of
|
||||||
unauthorized access or misuse of the data that I
|
unauthorized access or misuse of the data that I
|
||||||
agreed to share
|
agreed to share
|
||||||
- Information Security x Privacy
|
- Information Security x Privacy #flashcard
|
||||||
- Information security and privacy are **closely related,
|
- Information security and privacy are **closely related,
|
||||||
but distinct concepts**
|
but distinct concepts**
|
||||||
- Privacy is :-> an individual’s right to control the use and
|
- Privacy is :-> an individual’s right to control the use and
|
||||||
|
@ -2332,11 +2332,11 @@
|
||||||
data private
|
data private
|
||||||
- Security is the process; privacy is the result
|
- Security is the process; privacy is the result
|
||||||
- Cybercrime
|
- Cybercrime
|
||||||
- Cybercrime is an act that violates the law, by using
|
- Cybercrime is :-> an act that violates the law, by using
|
||||||
information and communication technology (ICT) to
|
information and communication technology (ICT) to
|
||||||
either target networks, systems, data, websites
|
either target networks, systems, data, websites
|
||||||
and/or technology or facilitate a crime
|
and/or technology or facilitate a crime
|
||||||
- Drivers of Cybersecurity
|
- Drivers of Cybersecurity #flashcard
|
||||||
- Legal and regulatory
|
- Legal and regulatory
|
||||||
- Commercial
|
- Commercial
|
||||||
- Technical
|
- Technical
|
||||||
|
|
Loading…
Reference in a new issue