Ensuring Information Security in the Digital Economy Ways Tojiyev Nuriddin Shukur o‘g‘li
Download 25.3 Kb. Pdf ko'rish
|
1 2
Bog'liq4.Ensuring Information Security in the Digital Economy Ways
- Bu sahifa navigatsiya:
- Abdualimov Shoxzod Alijon o‘g‘li Student, Institute of Economics and service Adilova Dinora Ablaqul qizi
- Key words
Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 http://innosci.org/ 64 | Page Ensuring Information Security in the Digital Economy Ways Tojiyev Nuriddin Shukur o‘g‘li Teacher, Institute of Economics and service, Samarkand Abdualimov Shoxzod Alijon o‘g‘li Student, Institute of Economics and service Adilova Dinora Ablaqul qizi Samarkand State University, student Annotation: Success in ensuring information security and protection, first of all, it depends on the security policy developed in the enterprise. The information security policy of the enterprise is valuable information security that governs management, rotection and distribution is a set of instructions, rules, procedures and practices. Key words: Information Warfare, Cyber Security, New Technologies, Modern Conflicts. Formation of digital economy, technical and technological base development and increasingly serious threats decisions related to information security professionals in the field and is demanding the acceptance of projects. For example, February 2019 Counterpoint Technology Market Research analyst at the beginning of the month company in the field of information security for 2019 presented the forecast. 1. Close care among hackers. Hackers are divided into different groups: traditional and ideological, government-sponsored and independent hackers. According to analysts According to this, these groups will soon be the product of others and start cooperation to use their services. Counterpoint Technology Market Research Researchers 2019 in IoT-devices, platforms, cloud systems and services a significant increase in capital expenditures for security are waiting 2. Organization of cyber attacks as a service. According to experts, hackers are harmful in 2019 remote work as a starting point for software distribution use table protocols. Besides, software for cybercriminals to launch malware can create and sell supply packages that give them their selection of ready-made products, regardless of experience in this field and allows attacks to be launched. 3. Machine learning as a weapon of the new generation. Malware is already deployed cyber defense bypassing machine learning elements in systems learned Experts say that the next step is hackers modern computers to automate targeting learning tools will be used. Such tools to find low-security systems and their vulnerabilities will be able to learn software. 4. Data theft The transition to digital technology and the Internet of Things is in the cloud of the amount of corporate and personal data stored led to an increase. Significant increase in data breaches Expected in 2019, especially cloud servers. 5. Smart home devices and external devices to attacks becomes defenseless against. A smart home that collects and stores personal data devices are easy targets for cyber attack because they are usually not nearly as safe. Peripheral devices confidential information equipped with very simple software for protection and works mainly in primary operating systems. Download 25.3 Kb. Do'stlaringiz bilan baham: |
1 2
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling