INFORMATION SECURITY TECHNOLOGIES

Authors

  • Abbosbek Abduvoxobov

DOI:

https://doi.org/10.47390/ts3030-3702v3i2y2025N05

Keywords:

information security, cybersecurity, cryptography, authentication, network security, data protection, risk analysis, information system, protection strategies, information encryption.

Abstract

This article discusses modern technologies used in ensuring information security, their functions and effectiveness. Along with the expansion of the global information space and the increase in cybersecurity threats, the issue of information protection is gaining urgent importance. The article analyzes such areas as cryptographic methods, authentication, network security, risk analysis and protection strategies in ensuring information security. It also considers advanced approaches to identifying and eliminating vulnerabilities in information systems. The article may be useful for professionals and researchers working in the field.

References

1. ISO/IEC 27001:2013 – Information security management systems – Requirements. International Organization for Standardization, 2013.

2. ISO/IEC 27002:2013 – Code of practice for information security controls. International Organization for Standardization, 2013.

3. Stallings, W. (2017). Network Security Essentials: Applications and Standards. 6th Edition. Pearson Education.

4. Whitman, M.E., & Mattord, H.J. (2018). Principles of Information Security. 6th Edition. Cengage Learning.

5. Andress, J. (2019). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. 2nd Edition. Syngress.

6. Kaspersky, E. (2020). Network Security and Cryptography. 3rd Edition. McGraw-Hill.

7. Kaspersky, E. (2020). Network Security and Cryptography. 3rd Edition. McGraw-Hill.

8. Schneier, B. (2015). Secrets and Lies: Digital Security in a Networked World. Wiley.

9. ISO/IEC 27005:2018 – Information security risk management. International Organization for Standardization, 2018.

10. Bertino, E., Sandhu, R. (2005). Database Security: Concepts, Approaches, and Challenges. Springer.

11. Sommers, M. (2020). Cybersecurity and Information Security Fundamentals. CRC Press.

12. Rainer, M. (2020). Network Security: A Beginner's Guide. McGraw-Hill.

13. Merritt, M. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers. McGraw-Hill.

14. Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley

Downloads

Submitted

2025-06-09

Published

2025-06-11

How to Cite

Abduvoxobov , A. (2025). INFORMATION SECURITY TECHNOLOGIES. Techscience Uz - Topical Issues of Technical Sciences, 3(2), 31–35. https://doi.org/10.47390/ts3030-3702v3i2y2025N05

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.