Published May 25, 2024
| Version v1
Conference paper
Open
AXBOROTNI HIMOYALASHNING REAKTIV VA PROAKTIV TEXNOLOGIYALARI
Authors/Creators
- 1. Termiz davlat universiteti Kompyuter tizimlari va ularning dasturiy ta'minoti 1-kurs magistranti
Description
Axborot-kommunikantsion tarmoqlarda saqlanadigan, qayta ishlanadigan va uzatiladigan axborotlarning xavfsizligini ta’minlash dolzarb masalalardan hisoblanadi. Ularning xavfsizligini ta’minlashda dastlab axborotni himoyalash texnologiyalarini to’g’ri tanlashga asoslanadi. Muhim obyektlarda axborot xavfsizligining tashkil etuvchilari quyidagi rasmda keltirilgan bo’lib, u to’laligicha axborot xavfsizligini ta’minlashga qaratilgan.
Files
Jumayev Ulug’bek 465-468 XXI asr.pdf
Files
(298.4 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:3bebbe9647b91c36b80ad39f84e6e237
|
298.4 kB | Preview Download |
Additional details
References
- 1. O'zbekiston Respublikasi Prezidentining farmoni. O'zbekiston Respublikasini yanada rivojlantirish bo'yicha Harakatlar strategiyasi to'g'risida. 2017 yil.
- 2. Villeneuve N., Bennett J. Detecting apt activity with network traffic analysis //Trend Micro Incorporated Research Paper. – 2012. – С. 1-13.
- 3. Vargas J. F. et al. Off-line signature verification based on grey level information using texture features //Pattern Recognition. – 2011. – Т. 44. – №. 2. – С. 375-385.
- 4. Stallings W. et al. Computer security: principles and practice. – Upper Saddle River (NJ : Pearson Education, 2012. – С. 978-0.
- 5. Uskov A. V. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance //2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. – IEEE, 2012. – С. 1042-1048.
- 6. Fan K., Li H., Wang Y. Security analysis of the Chap protocol using BAN logic //2009 Fifth International Conference on Information Assurance and Security. – IEEE, 2009. – Т. 2. – С. 467-470.
- 7. Peltier T. R. Information security fundamentals. – CRC press, 2013.