AXBOROT XAVFSIZLIGINI BOSHQARUV TIZIMI UOʻK: 004.056.5
Referat
Ushbu maqolada axborot xavfsizligi mavzusiga oid adabiyotlarning toʻliq tahlili keltirilgan boʻlib, unda ushbu bilim sohasi bilan bogʻliq barcha tamoyillar ochib berilgan. Internet tarmogʻida paydo boʻlishi mumkin boʻlgan tahdidlar va bu tahdidlarning oldini olish uchun qanday choralar koʻrish kerakligi oʻrganiladi. Axborot tizimlari xavfsizligini taʼminlash uchun zarur boʻlgan tadqiqot usullari ham atroflicha oʻrganilib, axborot xavfsizligini boshqarish tizimini yaratish va uni himoya qilishni tashkil etish boʻyicha tavsiyalar taklif etildi. Tadqiqot natijasida maxfiy maʼlumotlarni potentsial tahdidlardan samaraliroq himoya qilish imkonini beruvchi usullar taklif etildi.
Mualliflar haqida
Adabiyotlar ro'yxati
Гасымов В.А. Информационная безопасность: компьютерная преступность и кибертерроризм, Баку, Элм, 2007.
Имамвердиев Ю.Н., «Толковый словарь терминов информационной безопасности», 2015.
Алигулиев Р.М., Имамвердиев Ю.Н. Технология цифровой подписи, Баку, Элм, 2003.А.Бирюков “Информационная безопасность: защита и нападение“ (2-е изд.), 2017.
Christopher J. Hadnagy Social Engineering: The Science of Human Hacking (2nd Edition), 2018.
Agayev F.H., Mehdiyeva A.M., Gafarov G.A., Bakhshaliyeva S.V., Shirinzade N.V. Development of the functional safety system in primary oil refining Nafta-Gaz. Oil and Gas Institute — National Research Institute. Poland. ISSN 0867-8871. https://www.inig.pl/en/nafta-gaz-en/available-articles.
Mehdiyeva A.M., Sardarova İ.Z. Quliyeva S.V. Methods for Increasing Accuracy in the Process of Information Exchange and Processing. Novel Research Aspects in Mathematical and Computer Science. BP International, Vol. 4, 2022, Chapter 11, Page 108-122.
E. D. Zwicky, S. Cooper, D. Brent Chapman Building Internet Firewalls: Internet and Web Security, 2000.
Mehdiyeva A.M. Types of accidents, their causes and prevention measures. Actual problems of modern science. Proceedings of the IV International Scientific and Practical Conference. January 31-February 3, Boston, USA. 2023. pp. 441-444. https://isg-konf.com/actual-problems-of-modern-science/
Mehdiyeva A.M., Bakhtiyarov I.N., Bakhshaliyeva S.V. Increasing the Immunity of Information Transmission and Fault Tolerance of the Path. Lecture Notes on Data Engineering and Communications Technologies. Volume 166. Mobile Computing and Sustainable Informatics. Proceedings of ICMCSI 2023, 11-12 January 2023. Tribhuvan University, Nepal. pp. 775 – 784. http://icmcsi.com/2023/
D. Cappelli, A. Moore, R. Trzeciak The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering) (1st Edition), 2012.
Mehdiyeva A.M., Sardarova I.Z., Mahmudova Z.A. Development of an Information Accuracy Control System. Lecture Notes on Data Engineering and Communications Technologies. Volume 166. Mobile Computing and Sustainable Informatics. Proceedings of ICMCSI 2023, 11-12 January 2023. Tribhuvan University, Nepal. pp. 173 – 179. http://icmcsi.com/2023/
Fei Hu Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, 2016.
Honig A. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (1st Edition), 2012.
Wittkop J. Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices, 2016.
Peltier T.R. Information Security Policies, Procedures, and Standards Guidelines for Effective Information Security Management, 2001.
Diogenes Y., Dr. Erdal Ozkaya Cybersecurity — Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics, 2018.