Ensuring Information Security in the Digital Economy Ways Tojiyev Nuriddin Shukur o‘g‘li


Download 25.3 Kb.
Pdf ko'rish
bet1/2
Sana14.11.2023
Hajmi25.3 Kb.
#1773247
  1   2
Bog'liq
4.Ensuring Information Security in the Digital Economy Ways



Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) 
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 
http://innosci.org/ 
64 | Page 
Ensuring Information Security in the Digital Economy Ways 
 
Tojiyev Nuriddin Shukur o‘g‘li 
Teacher, Institute of Economics and service, Samarkand 
Abdualimov Shoxzod Alijon o‘g‘li 
Student, Institute of Economics and service 
Adilova Dinora Ablaqul qizi 
Samarkand State University, student 
 
Annotation:
Success in ensuring information security and protection, first of all, it 
depends on the security policy developed in the enterprise. The information security policy of the 
enterprise is valuable information security that governs management, rotection and distribution is 
a set of instructions, rules, procedures and practices.
Key words:
 Information Warfare, Cyber Security, New Technologies, Modern Conflicts.
 
 
Formation of digital economy, technical and technological base development and increasingly 
serious threats decisions related to information security professionals in the field and is demanding 
the acceptance of projects. For example, February 2019 Counterpoint Technology Market 
Research analyst at the beginning of the month company in the field of information security for 
2019 presented the forecast.
1. Close care among hackers. Hackers are divided into different groups: traditional and 
ideological, government-sponsored and independent hackers. According to analysts According 
to this, these groups will soon be the product of others and start cooperation to use their 
services. Counterpoint Technology Market Research Researchers 2019 in IoT-devices, 
platforms, cloud systems and services a significant increase in capital expenditures for security 
are waiting 
2. Organization of cyber attacks as a service. According to experts, hackers are harmful in 2019 
remote work as a starting point for software distribution use table protocols. Besides, software 
for cybercriminals to launch malware can create and sell supply packages that give them their 
selection of ready-made products, regardless of experience in this field and allows attacks to 
be launched.
3. Machine learning as a weapon of the new generation. Malware is already deployed cyber 
defense bypassing machine learning elements in systems learned Experts say that the next step 
is hackers modern computers to automate targeting learning tools will be used. Such tools to 
find low-security systems and their vulnerabilities will be able to learn software.
4. Data theft The transition to digital technology and the Internet of Things is in the cloud of the 
amount of corporate and personal data stored led to an increase. Significant increase in data 
breaches Expected in 2019, especially cloud servers.
5. Smart home devices and external devices to attacks becomes defenseless against. A smart 
home that collects and stores personal data devices are easy targets for cyber attack because 
they are usually not nearly as safe. Peripheral devices confidential information equipped with 
very simple software for protection and works mainly in primary operating systems.



Download 25.3 Kb.

Do'stlaringiz bilan baham:
  1   2




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling