CYBERSECURITY AND INFORMATION PROTECTION TO DO PROBLEMS

Authors

  • Mamatov Shahzodbek Author
  • Shukurjonova Khurshidabonu Author
  • Bakhramov Komiljon Author

Abstract

Information safety in the center information protection to do activity — its confidentiality , availability and integrity providing , as well as critical in the situation every how compromise road not to let issue lies . In such cases natural , man-made and social disasters , computer from work output , physical theft and others The world​ most organizations work processes still paper based on to documents based on , is , belongs to information safety Although it requires measures , in enterprises digital technologies current to grow according to initiatives number stable grow This is​ information protection to do for  information Information technology (IT) security according to experts attraction This requires​​​ experts information safety technology ( many in cases computer systems one provides a modern​​ information technologies under the circumstances cybersecurity and information protection to do to the problems dedicated . Information​ exchange , storage and of transmission digital platforms through done increase threats number to increase reason what is happening scientific basically illuminated . Modern cyber risks analysis made , they detection , prevention to take and them eliminate to grow according to effective solutions seeing​ DDoS attacks , phishing, malware are at work . programs , social engineering , data theft​ such as cybersecurity of problems practical appearances​ about idea The information is maintained . protection in doing encryption technologies , identification systems , safe network infrastructure , users information safety according to knowledge increase necessity important aspects as It is also emphasized in the work international experience , big of companies cybersecurity strategies , global standards (ISO/IEC 27001, GDPR, NIST ) information given . Uzbekistan​ In the Republic done increasing measures , legislation and national strategies in the example of local approach analysis This​​ work IT, information security , digital technologies , network engineering and other studying in the following fields : students , professionals and state and private organizations for practical importance has

References

• . Caesarean section of life . M.: Publisher "Nauka", 1964.

• Singh, Simon . Encryption to Kni . Taynaya istoriya shifrov i ix rashfirovki . M.: Izdanie "AST", 2009. ISBN 5-17-038477-7 .

• . "Chernye Kabinety" . M.: Novoe literaturnoe obozrenie, 2015. ISBN 978-5-4448-0392-9 .

• Zhelnikov V.: Cryptography ot papyrus do computera

• Anin B.Yu.: Radio electronic espionage

• . Kratkiy istorichesky essay on the development of cryptography . Moscow University i razvitie kriptrogii v Rossii, MGU, October 17-18, 2002, 2002.

• . History of cryptography in Russia . Applied discrete mathematics, 2012.

• . Triad "confidentialnost, tselostnost, availability": a mother in the wild? . SecurityLab.ru, 2012.

• . Aktualnye voprosy nauchnoy i nauchno-pedagogicheskoy deyatelnosti molodyx uchenyx . M.: IIU MGOU, 2016. ISBN 978-5-7017-2532-2 .

• . Odin iz mifov o kreysere "Magdeburg" . Voprosy istorii, 2007. ( Wayback Machine on the site on 2013-09-26 archived )

• "05.13.19 Methods and systems of information security, information security" (DOC). Vysshaya attestatsionnaya commission (VAK) . Original on August 2, 2018 from a copy Archived from the original on 19 July 2018. Retrieved 19 July 2018.

• "GOST R ISO/MEK 27000-2012" . Information technology (IT). Methods and means of obespecheniya bezopasnosti. Information security in system management. General overview and terminology (PDF). Rosstandart . Viewed : July 20, 2018.

FOREIGN IN THEIR LANGUAGES:

• Andress, J. . The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice . Syngress , 2014. ISBN 9780128008126 .

• Stewart, James Michael; Mike, Chapple; Darryl, Gibson . CISSP® Certified Information Systems Security Professional Study Guide . Canada: Seventh Edition, John Wiley & Sons, Inc., 2015. ISBN 978-1-119-04271-6 .

• Moore, Robert . Cybercrime Investigating High Technology Computer Crime . Boston: 2nd ed ., 2011. ISBN 9781437755824 .

• Ramzan, Zulfikar . Handbook of Information and Communication Security . L.: Springer Science & Business Media, 2010. ISBN 978-3-642-04117-4 .

• Johnson, John . The Evolution of British Sigint 1653–1939 . Her Majesty's Stationary Office, 1998.

• Soboleva, T. A. . Introduction Istoriya shifrovalnogo dela v Rossii . M.: OLMA-Press, 2002. ISBN 5224036348 .

• Spies, Wiretaps, and Secret Operations An Encyclopedia of American Espionage . Santa Barbara , CA, USA: ABC-CLIO, LLC, 2011. ISBN 978-1-85109-807-1 .

Downloads

Published

2025-08-16