AXBOROT XAVFSIZLIGI TALABLARI BO‘YICHA KORPORATIV TARMOQLARDA KIBERXAVFSIZLIKNI TA’MINLASH
Keywords:
Xavfsizlik devorlari , ko‘p faktorli autentifikatsiya , xodimlarni o‘qitish , ma’lumotlarni shifrlash, doimiy dasturiy ta’minotni tuzatish , xavfsizlik choralari.Abstract
Ushbu maqolada korporativ tarmoqlarni tug’lishi mumkin bo’lgan risklarni oldini olish va xavf soluvchi potensial risklar haqida xodimlarni xabardor qilish , xavfsizlikni ta’minlash va kuchaytirish o’rganilgan
Downloads
References
S.K.Ganiev, T.A.Kuchkarov. Tarmoq xavfsizligi (Mobil tarmoq xavfsizligi). O‘quv qo‘llanma. –T.: «Aloqachi», 2019, 140 b.
S.K.Ganiev, M.M.Karimov, Z.T.Xudoyqulov, M.M.Kadirov. Axborot xavfsizligi bo‘yicha atama va tushunchalarning rus, o‘zbek va ingliz tillaridagi izohli lug‘ati. –T.: «Iqtisod-moliya», - 2017, 480 bet.
S.K.Ganiev, M.M.Karimov, K.A.Tashev. Axborot xavfsizligi. –T.: «Fan va texnologiya», 2016, 372 bet.
Stamp M. Information security: principles and practice // John Wiley & Sons, 2011, -P. – 606.
Марков А. С., Барабанов А. В., Дорофеев А. В., Цирлов В.Л. Семь безопасных информационных технологий / под ред. А.С.Маркова. –М.: ДМК Пресс, -2017. – 224с.
D.Y.Akbarov, P.F.Xasanov, X.P.Xasanov, O.P.Axmedova, I.U.Xolimtoyeva. Kriptografiyaning matematik asoslari. O‘quv qo‘llanma. –T.: «Aloqachi», 2019, 192 bet.
Шаньгин, В. Ф. Информационная безопасность компьютерных систем и сетей : учеб. пособие / В.Ф. Шаньгин. — Москва : ИД «ФОРУМ» : ИНФРА-М, 2017. — 416 с.
Raef Meeuwisse. Cybersecurity for Beginners (2nd. ed.). Cyber Simplicity Ltd, London, England, 2017, - 224 p.
Pande J. Introduction to Cyber Security. Uttarakhand Open University, 2017, -152 p.
Curricula Cybersecurity. Curriculum guidelines for post- secondary degree programs in cybersecurity. – 2017.
Zlatanov N. Hard Disk Drive and Disk Encryption, 2015, DOI: 10.13140/RG.2.1.1228.9681.
Ganiev S.K., Khudoykulov Z.T., Islomov Sh.Z., Selection suitable biometrics for cryptographic key generators // TUIT BULLETIN, Tashkent, 2016, №4 (40), – P. 80-92
Report to Congress on Breaches of Unsecured Protected Health Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health and Human Services Office for Civil Rights. https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015- 2016-2017.pdf
Fundamentals of General Ecology, Life Safety and Environment Protection. Mark D Goldfein, Alexei V Ivanov, Nikolaj Kozhevnikov, V Kozhevnikov. Nova Science Publishers, Inc. (April 25, 2013).
Life safety and environmental management (in terms, concepts, facts and figures): textbook / A. Nigmatov, Sh. Mukhamedov, N. Khasanova. T.: Navroz, 2014. 199 6.
Sapaev M.. Kadyrov F.M. "Life Safety and Ecology", Tashkent-2019. 276 v.
INTERNET MANBALARI
Analysis of Intrusion Detection Systems (IDS) https://ukdiss.com/examples/hujumlar-prevention-security.php
Comparative study and analysis of network hujumlar detection tools | Semantic Scholar https://www.semanticscholar.org/paper/Comparative-study-and-analysis-of-network-hujumlar-Bhosale-Mane/e9ee6ba38bc03b51c8fa54e3cf0db9de7582e2fd
https://www.sdtek.net/8-common-ways-hackers-break-into-computer-systems
https://www.memcyco.com/home/threat-detection-techniques/
https://www.neumetric.com/host-hujumlar-detection-system/
https://www.stamus-networks.com/ids-detection-types
https://www.intechopen.com/chapters/88343#B4
https://corelight.com/resources/glossary/signature-based-detection