CYBERSECURITY AND INFORMATION PROTECTION TO DO PROBLEMS
Abstract
Information safety in the center information protection to do activity — its confidentiality , availability and integrity providing , as well as critical in the situation every how compromise road not to let issue lies . In such cases natural , man-made and social disasters , computer from work output , physical theft and others The world most organizations work processes still paper based on to documents based on , is , belongs to information safety Although it requires measures , in enterprises digital technologies current to grow according to initiatives number stable grow This is information protection to do for information Information technology (IT) security according to experts attraction This requires experts information safety technology ( many in cases computer systems one provides a modern information technologies under the circumstances cybersecurity and information protection to do to the problems dedicated . Information exchange , storage and of transmission digital platforms through done increase threats number to increase reason what is happening scientific basically illuminated . Modern cyber risks analysis made , they detection , prevention to take and them eliminate to grow according to effective solutions seeing DDoS attacks , phishing, malware are at work . programs , social engineering , data theft such as cybersecurity of problems practical appearances about idea The information is maintained . protection in doing encryption technologies , identification systems , safe network infrastructure , users information safety according to knowledge increase necessity important aspects as It is also emphasized in the work international experience , big of companies cybersecurity strategies , global standards (ISO/IEC 27001, GDPR, NIST ) information given . Uzbekistan In the Republic done increasing measures , legislation and national strategies in the example of local approach analysis This work IT, information security , digital technologies , network engineering and other studying in the following fields : students , professionals and state and private organizations for practical importance has
References
• . Caesarean section of life . M.: Publisher "Nauka", 1964.
• Singh, Simon . Encryption to Kni . Taynaya istoriya shifrov i ix rashfirovki . M.: Izdanie "AST", 2009. ISBN 5-17-038477-7 .
• . "Chernye Kabinety" . M.: Novoe literaturnoe obozrenie, 2015. ISBN 978-5-4448-0392-9 .
• Zhelnikov V.: Cryptography ot papyrus do computera
• Anin B.Yu.: Radio electronic espionage
• . Kratkiy istorichesky essay on the development of cryptography . Moscow University i razvitie kriptrogii v Rossii, MGU, October 17-18, 2002, 2002.
• . History of cryptography in Russia . Applied discrete mathematics, 2012.
• . Triad "confidentialnost, tselostnost, availability": a mother in the wild? . SecurityLab.ru, 2012.
• . Aktualnye voprosy nauchnoy i nauchno-pedagogicheskoy deyatelnosti molodyx uchenyx . M.: IIU MGOU, 2016. ISBN 978-5-7017-2532-2 .
• . Odin iz mifov o kreysere "Magdeburg" . Voprosy istorii, 2007. ( Wayback Machine on the site on 2013-09-26 archived )
• "05.13.19 Methods and systems of information security, information security" (DOC). Vysshaya attestatsionnaya commission (VAK) . Original on August 2, 2018 from a copy Archived from the original on 19 July 2018. Retrieved 19 July 2018.
• "GOST R ISO/MEK 27000-2012" . Information technology (IT). Methods and means of obespecheniya bezopasnosti. Information security in system management. General overview and terminology (PDF). Rosstandart . Viewed : July 20, 2018.
FOREIGN IN THEIR LANGUAGES:
• Andress, J. . The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice . Syngress , 2014. ISBN 9780128008126 .
• Stewart, James Michael; Mike, Chapple; Darryl, Gibson . CISSP® Certified Information Systems Security Professional Study Guide . Canada: Seventh Edition, John Wiley & Sons, Inc., 2015. ISBN 978-1-119-04271-6 .
• Moore, Robert . Cybercrime Investigating High Technology Computer Crime . Boston: 2nd ed ., 2011. ISBN 9781437755824 .
• Ramzan, Zulfikar . Handbook of Information and Communication Security . L.: Springer Science & Business Media, 2010. ISBN 978-3-642-04117-4 .
• Johnson, John . The Evolution of British Sigint 1653–1939 . Her Majesty's Stationary Office, 1998.
• Soboleva, T. A. . Introduction Istoriya shifrovalnogo dela v Rossii . M.: OLMA-Press, 2002. ISBN 5224036348 .
• Spies, Wiretaps, and Secret Operations An Encyclopedia of American Espionage . Santa Barbara , CA, USA: ABC-CLIO, LLC, 2011. ISBN 978-1-85109-807-1 .