KONFIDENSIAL AXBOROTLARNI HARAKATINI NAZORATLASH USULI
Keywords:
Konfidentsiallik, Nazorat, Shifrlash, Monitoring, AutentifikatsiyaAbstract
Axborot xavfsizligi dolzarb masalalardan biri bo‘lib, ayniqsa, konfidentsial ma’lumotlarning harakatini nazorat qilish muhim ahamiyat kasb etadi. Ushbu maqolada konfidentsial axborotlarning tarqalishini oldini olish va nazorat qilish usullari tahlil qilinadi. Maqolada ma’lumotlar oqimini boshqarish, monitoring tizimlarini qo‘llash, shifrlash va autentifikatsiya texnologiyalaridan foydalanish usullari ko‘rib chiqiladi. Shuningdek, ma’lumotlarning noqonuniy tarqalishining oldini olish uchun dasturiy va apparat vositalari integratsiyasi muhokama qilinadi. Tadqiqot natijalari axborot xavfsizligi tizimlarini takomillashtirish va tashkilotlarda axborot muhofazasini mustahkamlashga xizmat qiladi.
References
Stallings, W. (2018). Cryptography and Network Security: Principles and Practice. Pearson.
Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
Pfleeger, C. P., & Pfleeger, S. L. (2012). Security in Computing. Prentice Hall.
Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
NIST Special Publication 800-53. (2020). Security and Privacy Controls for Federal Information Systems and Organizations.
ISO/IEC 27001:2022. Information Security Management Systems – Requirements. International Organization for Standardization.
Chen, L., & Guo, F. (2021). "Data Leakage Prevention in Enterprise Networks." IEEE Transactions on Information Forensics and Security, 16, 2451-2465.
Kaspersky Lab Report. (2023). Threat Intelligence Report: Data Protection Trends and Strategies.
Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). "Security and Privacy Challenges in Industrial Internet of Things." ACM Computing Surveys, 49(4), 1-37.
ENISA Report. (2023). Guidelines on Data Protection by Design and by Default in Information Systems. European Union Agency for Cybersecurity.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Bozorov Obidjon Norqobilovich

This work is licensed under a Creative Commons Attribution 4.0 International License.