Ensuring Information Security in the Digital Economy Ways Tojiyev Nuriddin Shukur o‘g‘li
Nexus : Journal of Innovative Studies of Engineering Science ( JISES )
Download 25.3 Kb. Pdf ko'rish
|
1 2
Bog'liq4.Ensuring Information Security in the Digital Economy Ways
- Bu sahifa navigatsiya:
- REFERENCES
- Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 http://innosci.org/
Nexus : Journal of Innovative Studies of Engineering Science ( JISES )
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 http://innosci.org/ 65 | Page By the end of 2019, hackers will find systems with low security modern computers for automation purposes expected to use learning tools. 6. Developers of solutions in the field of cyber security cooperation and expansion of cooperation between Cyber security for software developers the strengths and strengths of the partnership companies unites Together, they not only combat malware, but also provide effective solutions for learning and growth possible 7. Multi-factor authentication and smart device identification Identity is a key component of cyber security, that's all including the Internet of Things. The ID model is now 2019 By then it wasn't directed at the user - now it's at the machine directed. Analysts multi-factor authentication and smart that identity will be the cornerstone of IoT cybersecurity in 2019 emphasizes. 8. Protection based on machine learning Machine learning is already detecting malware is used to monitor activity. Besides, this technology is more than traditional tools processes and analyzes data faster, but also threats and also provides prediction of cyber attacks. 9. Cyber security solutions built into the equipment Implementation of security at the hardware level is the most of 2018 turned out to be one of the most exciting solutions, says the study. This solve the problems of cloning and hacking of protection software and with unique identification and provides secure authentication. 10. To security personnel in the public and private sector increase in demand Confidential information of users from companies New laws requiring protection are public and private has created a huge demand for skilled security personnel in the sector. As practice shows, information protection both for the state as a whole, individual sectors of the economy or is also relevant for companies. From a practical point of view, the world is changing, some areas of information security are a thing of the past information security, depending on the appearance of new ones concept is changing. Performed at the junction of PR and GR directly to the country or business activity to be increased combating information interference remains a separate task. Scientific research in the field of information security is no longer theoretical. Tasks are becoming more complex, most of them absolutely in new areas including: geopolitical dominance; development of cyber weapons; crypto-currencies and tokens; telemedicine; virtualization time. Local developers are always developing technologies they do not keep pace with, but every year information on the market new to solve security problems products appear. REFERENCES: 1. Абакумов П. А. Алгоритм выбора головного узла кластера сенсорной сети в трехмерном пространстве. Электросвязь, №4, 2014. 2. Абакумов П. А. Алгоритм кластеризации для мобильных беспроводных сенсорных сетей в трехмерном пространстве/ П. А. Абакумов, А. Е. Кучерявый // Электросвязь, №9, 2015. Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 http://innosci.org/ 66 | Page 3. A Hybrid Course Recommendation System by Integrating CollaborativeFiltering and Artificial Immune Systems 4. A Personalized Course Recommendation System Based on Career Goals 5. Hybrid Educational Recommender System, Utilizing Student, Teacher andDomain Preferences and Amazon Alexa Conversation Engine 6. Kulakov A. G. , Lando S. K. , Semyonov A. L. , Shen A. X. Algoritmika. V-V II sinflar. Moskva: Drofa, 1997. Download 25.3 Kb. Do'stlaringiz bilan baham: |
1 2
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling