AXBOROT XAVFSIZLIGINI TA’MINLASH TEXNOLOGIYALARI

Mualliflar

  • Abbosbek Abduvoxobov

Kalit so'zlar

https://doi.org/10.47390/ts3030-3702v3i2y2025N05

Kalit so'zlar

axborot xavfsizligi, kiberxavfsizlik, kriptografiya, autentifikatsiya, tarmoq xavfsizligi, ma’lumotlarni himoya qilish, xavf tahlili, axborot tizimi, himoya strategiyalari, axborotni shifrlash.

Annotasiya

Ushbu maqolada axborot xavfsizligini ta’minlashda qo‘llanilayotgan zamonaviy texnologiyalar, ularning vazifalari hamda samaradorligi yoritilgan. Global axborot makonining kengayishi, kiberxavfsizlik tahdidlarining ortib borishi bilan bir qatorda, axborotni himoya qilish masalasi dolzarb ahamiyat kasb etmoqda. Maqolada axborot xavfsizligini ta’minlashda kriptografik usullar, autentifikatsiya, tarmoq xavfsizligi, xavf tahlili va himoya strategiyalari kabi yo‘nalishlar tahlil qilinadi. Shuningdek, axborot tizimlarining zaifliklarini aniqlash va ularni bartaraf etish bo‘yicha ilg‘or yondashuvlar ham ko‘rib chiqilgan. Maqola sohada faoliyat yurituvchi mutaxassislar hamda tadqiqotchilar uchun foydali bo‘lishi mumkin.

Manbalar

1. ISO/IEC 27001:2013 – Information security management systems – Requirements. International Organization for Standardization, 2013.

2. ISO/IEC 27002:2013 – Code of practice for information security controls. International Organization for Standardization, 2013.

3. Stallings, W. (2017). Network Security Essentials: Applications and Standards. 6th Edition. Pearson Education.

4. Whitman, M.E., & Mattord, H.J. (2018). Principles of Information Security. 6th Edition. Cengage Learning.

5. Andress, J. (2019). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. 2nd Edition. Syngress.

6. Kaspersky, E. (2020). Network Security and Cryptography. 3rd Edition. McGraw-Hill.

7. Kaspersky, E. (2020). Network Security and Cryptography. 3rd Edition. McGraw-Hill.

8. Schneier, B. (2015). Secrets and Lies: Digital Security in a Networked World. Wiley.

9. ISO/IEC 27005:2018 – Information security risk management. International Organization for Standardization, 2018.

10. Bertino, E., Sandhu, R. (2005). Database Security: Concepts, Approaches, and Challenges. Springer.

11. Sommers, M. (2020). Cybersecurity and Information Security Fundamentals. CRC Press.

12. Rainer, M. (2020). Network Security: A Beginner's Guide. McGraw-Hill.

13. Merritt, M. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers. McGraw-Hill.

14. Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley

##submission.downloads##

Yuborilgan

2025-06-09

Nashr qilingan

2025-06-11

Qanday ko'rsatish

Abduvoxobov , A. (2025). AXBOROT XAVFSIZLIGINI TA’MINLASH TEXNOLOGIYALARI. Techscience Uz - Topical Issues of Technical Sciences, 3(2), 31–35. https://doi.org/10.47390/ts3030-3702v3i2y2025N05

##plugins.generic.recommendBySimilarity.heading##

1 2 3 4 > >> 

##plugins.generic.recommendBySimilarity.advancedSearchIntro##