Ensuring Information Security in the Digital Economy Ways Tojiyev Nuriddin Shukur o‘g‘li


Nexus : Journal of Innovative Studies of Engineering Science ( JISES )


Download 25.3 Kb.
Pdf ko'rish
bet2/2
Sana14.11.2023
Hajmi25.3 Kb.
#1773247
1   2
Bog'liq
4.Ensuring Information Security in the Digital Economy Ways

Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) 
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 
http://innosci.org/ 
65 | Page 
By the end of 2019, hackers will find systems with low security modern computers for automation 
purposes expected to use learning tools.
6. Developers of solutions in the field of cyber security cooperation and expansion of 
cooperation between Cyber security for software developers the strengths and strengths of the 
partnership companies unites Together, they not only combat malware, but also provide 
effective solutions for learning and growth possible 
7. Multi-factor authentication and smart device identification Identity is a key component of 
cyber security, that's all including the Internet of Things. The ID model is now 2019 By then it 
wasn't directed at the user - now it's at the machine directed. Analysts multi-factor 
authentication and smart that identity will be the cornerstone of IoT cybersecurity in 2019 
emphasizes.
8. Protection based on machine learning Machine learning is already detecting malware is used 
to monitor activity. Besides, this technology is more than traditional tools processes and 
analyzes data faster, but also threats and also provides prediction of cyber attacks.
9. Cyber security solutions built into the equipment Implementation of security at the hardware 
level is the most of 2018 turned out to be one of the most exciting solutions, says the study. 
This solve the problems of cloning and hacking of protection software and with unique 
identification and provides secure authentication.
10. To security personnel in the public and private sector increase in demand Confidential 
information of users from companies New laws requiring protection are public and private has 
created a huge demand for skilled security personnel in the sector.
As practice shows, information protection both for the state as a whole, individual sectors of the 
economy or is also relevant for companies. From a practical point of view, the world is changing, 
some areas of information security are a thing of the past information security, depending on the 
appearance of new ones concept is changing. Performed at the junction of PR and GR directly to 
the country or business activity to be increased combating information interference remains a 
separate task.
Scientific research in the field of information security is no longer theoretical.
Tasks are becoming more complex, most of them absolutely in new areas including: 
geopolitical dominance
 development of cyber weapons; 
 crypto-currencies and tokens; 
telemedicine
 virtualization time.
Local developers are always developing technologies they do not keep pace with, but every year 
information on the market new to solve security problems products appear.
REFERENCES: 
1. Абакумов П. А. Алгоритм выбора головного узла кластера сенсорной сети в трехмерном 
пространстве. Электросвязь, №4, 2014.
2. Абакумов П. А. Алгоритм кластеризации для мобильных беспроводных сенсорных 
сетей в трехмерном пространстве/ П. А. Абакумов, А. Е. Кучерявый // Электросвязь, 
№9, 2015.


Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) 
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 
http://innosci.org/ 
66 | Page 
3. A Hybrid Course Recommendation System by Integrating CollaborativeFiltering and Artificial 
Immune Systems
4. A Personalized Course Recommendation System Based on Career Goals
5. Hybrid Educational Recommender System, Utilizing Student, Teacher andDomain Preferences 
and Amazon Alexa Conversation Engine 
6. Kulakov A. G. , Lando S. K. , Semyonov A. L. , Shen A. X. Algoritmika. V-V II sinflar. 
Moskva: Drofa, 1997.

Download 25.3 Kb.

Do'stlaringiz bilan baham:
1   2




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling