AXBOROTNI HIMOYALASHNING REAKTIV VA PROAKTIV TEXNOLOGIYALARI
PDF
DOI

How to Cite

AXBOROTNI HIMOYALASHNING REAKTIV VA PROAKTIV TEXNOLOGIYALARI. (2024). "XXI ASRDA INNOVATSION TEXNOLOGIYALAR, FAN VA TAʼLIM TARAQQIYOTIDAGI DOLZARB MUAMMOLAR" Nomli Respublika Ilmiy-Amaliy Konferensiyasi, 2(5), 465-468. https://universalpublishings.com/index.php/itfttdm/article/view/5920

Abstract

Axborot-kommunikantsion tarmoqlarda saqlanadigan, qayta ishlanadigan va uzatiladigan axborotlarning xavfsizligini ta’minlash dolzarb masalalardan hisoblanadi. Ularning xavfsizligini ta’minlashda dastlab axborotni himoyalash texnologiyalarini to’g’ri tanlashga asoslanadi. Muhim obyektlarda axborot xavfsizligining tashkil etuvchilari quyidagi rasmda keltirilgan bo’lib, u to’laligicha axborot xavfsizligini ta’minlashga qaratilgan.

PDF
DOI

References

O’zbekiston Respublikasi Prezidentining farmoni. O’zbekiston Respublikasini yanada rivojlantirish bo’yicha Harakatlar strategiyasi to’g’risida. 2017 yil.

Villeneuve N., Bennett J. Detecting apt activity with network traffic analysis //Trend Micro Incorporated Research Paper. – 2012. – С. 1-13.

Vargas J. F. et al. Off-line signature verification based on grey level information using texture features //Pattern Recognition. – 2011. – Т. 44. – №. 2. – С. 375-385.

Stallings W. et al. Computer security: principles and practice. – Upper Saddle River (NJ : Pearson Education, 2012. – С. 978-0.

Uskov A. V. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance //2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. – IEEE, 2012. – С. 1042-1048.

Fan K., Li H., Wang Y. Security analysis of the Chap protocol using BAN logic //2009 Fifth International Conference on Information Assurance and Security. – IEEE, 2009. – Т. 2. – С. 467-470.

Peltier T. R. Information security fundamentals. – CRC press, 2013.