KONFIDENSIAL AXBOROTLARNI HARAKATINI NAZORATLASH USULI

Авторы

  • Obidjon Bozorov Mirzo Ulug'bek nomidagi O'zbekiston Milliy universiteti

Ключевые слова:

Konfidentsiallik, Nazorat, Shifrlash, Monitoring, Autentifikatsiya

Аннотация

Axborot xavfsizligi dolzarb masalalardan biri bo‘lib, ayniqsa, konfidentsial ma’lumotlarning harakatini nazorat qilish muhim ahamiyat kasb etadi. Ushbu maqolada konfidentsial axborotlarning tarqalishini oldini olish va nazorat qilish usullari tahlil qilinadi. Maqolada ma’lumotlar oqimini boshqarish, monitoring tizimlarini qo‘llash, shifrlash va autentifikatsiya texnologiyalaridan foydalanish usullari ko‘rib chiqiladi. Shuningdek, ma’lumotlarning noqonuniy tarqalishining oldini olish uchun dasturiy va apparat vositalari integratsiyasi muhokama qilinadi. Tadqiqot natijalari axborot xavfsizligi tizimlarini takomillashtirish va tashkilotlarda axborot muhofazasini mustahkamlashga xizmat qiladi.

Библиографические ссылки

Stallings, W. (2018). Cryptography and Network Security: Principles and Practice. Pearson.

Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.

Pfleeger, C. P., & Pfleeger, S. L. (2012). Security in Computing. Prentice Hall.

Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.

Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.

NIST Special Publication 800-53. (2020). Security and Privacy Controls for Federal Information Systems and Organizations.

ISO/IEC 27001:2022. Information Security Management Systems – Requirements. International Organization for Standardization.

Chen, L., & Guo, F. (2021). "Data Leakage Prevention in Enterprise Networks." IEEE Transactions on Information Forensics and Security, 16, 2451-2465.

Kaspersky Lab Report. (2023). Threat Intelligence Report: Data Protection Trends and Strategies.

Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). "Security and Privacy Challenges in Industrial Internet of Things." ACM Computing Surveys, 49(4), 1-37.

ENISA Report. (2023). Guidelines on Data Protection by Design and by Default in Information Systems. European Union Agency for Cybersecurity.

Опубликован

2025-02-28

Как цитировать

Bozorov , O. (2025). KONFIDENSIAL AXBOROTLARNI HARAKATINI NAZORATLASH USULI. Цифровая трансформация и искусственный интеллект, 3(1), 80–83. извлечено от https://dtai.tsue.uz/index.php/dtai/article/view/v3i1131