Published May 25, 2024 | Version v1
Conference paper Open

AXBOROTNI HIMOYALASHNING REAKTIV VA PROAKTIV TEXNOLOGIYALARI

  • 1. Termiz davlat universiteti Kompyuter tizimlari va ularning dasturiy ta'minoti 1-kurs magistranti

Description

Axborot-kommunikantsion tarmoqlarda saqlanadigan, qayta ishlanadigan va uzatiladigan axborotlarning xavfsizligini ta’minlash dolzarb masalalardan hisoblanadi. Ularning xavfsizligini ta’minlashda dastlab axborotni himoyalash texnologiyalarini to’g’ri tanlashga asoslanadi. Muhim obyektlarda axborot xavfsizligining tashkil etuvchilari quyidagi rasmda keltirilgan bo’lib, u to’laligicha axborot xavfsizligini ta’minlashga qaratilgan.

Files

Jumayev Ulug’bek 465-468 XXI asr.pdf

Files (298.4 kB)

Name Size Download all
md5:3bebbe9647b91c36b80ad39f84e6e237
298.4 kB Preview Download

Additional details

References

  • 1. O'zbekiston Respublikasi Prezidentining farmoni. O'zbekiston Respublikasini yanada rivojlantirish bo'yicha Harakatlar strategiyasi to'g'risida. 2017 yil.
  • 2. Villeneuve N., Bennett J. Detecting apt activity with network traffic analysis //Trend Micro Incorporated Research Paper. – 2012. – С. 1-13.
  • 3. Vargas J. F. et al. Off-line signature verification based on grey level information using texture features //Pattern Recognition. – 2011. – Т. 44. – №. 2. – С. 375-385.
  • 4. Stallings W. et al. Computer security: principles and practice. – Upper Saddle River (NJ : Pearson Education, 2012. – С. 978-0.
  • 5. Uskov A. V. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance //2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. – IEEE, 2012. – С. 1042-1048.
  • 6. Fan K., Li H., Wang Y. Security analysis of the Chap protocol using BAN logic //2009 Fifth International Conference on Information Assurance and Security. – IEEE, 2009. – Т. 2. – С. 467-470.
  • 7. Peltier T. R. Information security fundamentals. – CRC press, 2013.