AXBOROT XAVFSIZLIGI TALABLARI BO‘YICHA KORPORATIV TARMOQLARDA KIBERXAVFSIZLIKNI TA’MINLASH

Authors

  • Odilov Ozodbek Raxmatillo o’g’li Toshkent axborot texnologiyalari unversiteti Author

Keywords:

Xavfsizlik devorlari , ko‘p faktorli autentifikatsiya , xodimlarni o‘qitish , ma’lumotlarni shifrlash, doimiy dasturiy ta’minotni tuzatish , xavfsizlik choralari.

Abstract

Ushbu maqolada korporativ tarmoqlarni tug’lishi mumkin bo’lgan risklarni oldini olish va xavf soluvchi potensial risklar haqida xodimlarni xabardor qilish , xavfsizlikni ta’minlash va kuchaytirish o’rganilgan

Downloads

Download data is not yet available.

References

S.K.Ganiev, T.A.Kuchkarov. Tarmoq xavfsizligi (Mobil tarmoq xavfsizligi). O‘quv qo‘llanma. –T.: «Aloqachi», 2019, 140 b.

S.K.Ganiev, M.M.Karimov, Z.T.Xudoyqulov, M.M.Kadirov. Axborot xavfsizligi bo‘yicha atama va tushunchalarning rus, o‘zbek va ingliz tillaridagi izohli lug‘ati. –T.: «Iqtisod-moliya», - 2017, 480 bet.

S.K.Ganiev, M.M.Karimov, K.A.Tashev. Axborot xavfsizligi. –T.: «Fan va texnologiya», 2016, 372 bet.

Stamp M. Information security: principles and practice // John Wiley & Sons, 2011, -P. – 606.

Марков А. С., Барабанов А. В., Дорофеев А. В., Цирлов В.Л. Семь безопасных информационных технологий / под ред. А.С.Маркова. –М.: ДМК Пресс, -2017. – 224с.

D.Y.Akbarov, P.F.Xasanov, X.P.Xasanov, O.P.Axmedova, I.U.Xolimtoyeva. Kriptografiyaning matematik asoslari. O‘quv qo‘llanma. –T.: «Aloqachi», 2019, 192 bet.

Шаньгин, В. Ф. Информационная безопасность компьютерных систем и сетей : учеб. пособие / В.Ф. Шаньгин. — Москва : ИД «ФОРУМ» : ИНФРА-М, 2017. — 416 с.

Raef Meeuwisse. Cybersecurity for Beginners (2nd. ed.). Cyber Simplicity Ltd, London, England, 2017, - 224 p.

Pande J. Introduction to Cyber Security. Uttarakhand Open University, 2017, -152 p.

Curricula Cybersecurity. Curriculum guidelines for post- secondary degree programs in cybersecurity. – 2017.

Zlatanov N. Hard Disk Drive and Disk Encryption, 2015, DOI: 10.13140/RG.2.1.1228.9681.

Ganiev S.K., Khudoykulov Z.T., Islomov Sh.Z., Selection suitable biometrics for cryptographic key generators // TUIT BULLETIN, Tashkent, 2016, №4 (40), – P. 80-92

Report to Congress on Breaches of Unsecured Protected Health Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health and Human Services Office for Civil Rights. https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015- 2016-2017.pdf

Fundamentals of General Ecology, Life Safety and Environment Protection. Mark D Goldfein, Alexei V Ivanov, Nikolaj Kozhevnikov, V Kozhevnikov. Nova Science Publishers, Inc. (April 25, 2013).

Life safety and environmental management (in terms, concepts, facts and figures): textbook / A. Nigmatov, Sh. Mukhamedov, N. Khasanova. T.: Navroz, 2014. 199 6.

Sapaev M.. Kadyrov F.M. "Life Safety and Ecology", Tashkent-2019. 276 v.

INTERNET MANBALARI

Analysis of Intrusion Detection Systems (IDS) https://ukdiss.com/examples/hujumlar-prevention-security.php

Comparative study and analysis of network hujumlar detection tools | Semantic Scholar https://www.semanticscholar.org/paper/Comparative-study-and-analysis-of-network-hujumlar-Bhosale-Mane/e9ee6ba38bc03b51c8fa54e3cf0db9de7582e2fd

https://www.sdtek.net/8-common-ways-hackers-break-into-computer-systems

https://www.memcyco.com/home/threat-detection-techniques/

https://www.neumetric.com/host-hujumlar-detection-system/

https://www.stamus-networks.com/ids-detection-types

https://www.intechopen.com/chapters/88343#B4

https://corelight.com/resources/glossary/signature-based-detection

https://www.upguard.com/blog/hujumlar-detection-system

https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-hujumlar-detection-open-source-tools#install-suricata

Downloads

Published

2024-06-08