Karshi branch of tashkent university of information technologies named after mukhammad al-khorezmi


Download 1.05 Mb.
Pdf ko'rish
bet21/21
Sana23.07.2023
Hajmi1.05 Mb.
#1661934
1   ...   13   14   15   16   17   18   19   20   21
Bog'liq
MAIN DIPLOMA WORK (2)....

5. VIPRE 
You might have never heard about Vipre Antivirus, and that’s quite understandable. 
Even though the tool has received much praise from such independent testing 
organizations like AV-Comparatives, its name isn’t ingrained in the public 
consciousness just yet. 
In this Vipre Antivirus review, I’ll analyze this antimalware software in terms of 
features, virus detection rates, price, and ease of use. Let’s see whether Vipre truly 
deserves to explode in popularity in the future. 
Vipre pros and cons 
Pros 
• 
High virus detection rates 
• 
Lots of customization options 
• 
Many features 
• 
Ad and tracker blocking 
• 
The Bundle plan includes a VPN 
• 
Data breach scanner 
• 
A subscription covers five devices 
• 
30-day free trial version 
Cons 
• 
Mixed results in phishing detection 
• 
Relatively high CPU usage during scans 
• 
No application for iOS 
• 
Significant price increase after the first year 


75 
Vipre security features 
Advanced Active Protection 
Vipre's Advanced Active Protection is just a fancy name for real-time protection, 
which is a core feature of any antivirus and antimalware application. And Vipre makes 
it work quite well. 
The antivirus scores really highly in the independent virus detection tests by AV-
Comparatives. During the most recent testing period, it detected 96.8% of threats and 
produced only four false positives. In other words, Vipre has a very high chance of 
detecting a threat before it’s able to make any changes to your device. 
Device scans 
You can choose between a full scan, quick scan, and a custom scan. During the full 
scan, Vipre was using up to 4.9% CPU, which is quite a lot in comparison with other 
antivirus apps like McAfee. 
Also, even though you can see the history of the scans performed, there’s no way to 
see how long the scan lasted. 
The scans themselves are highly customizable. For example, you can scan 
removable drives, exclude various apps from scans, and let Vipre automatically perform 
a second layer scan if the quick scan spots a threat. 
When Vipre Antivirus detects malware, it immediately puts them into the quarantine 
folder. Here, you can see the type and threat level of the quarantined threat. 


76 
LIFE SAFETY 
It is known that any technical device has a danger zone. Danger zones are areas on 
the inside or outside of a machine or mechanism that pose a risk to a worker who is 
constantly or periodically working on it. Threats are halved into real and hidden. 
Therefore, the design of any machine must meet the following general and specific 
requirements: 
Specific requirements include lighting, noise, vibration and other parameters of the 
car within the sanitary and hygienic requirements, reliability of brakes, ease of operation 
and technical and aesthetic requirements. 
Safety measures and engineering. 
Risk reduction is mostly achieved through the following measures: 
- design and development of safe equipment; 
- use of engineering and technical means of risk protection; 
- Development and implementation of safe, modern technological processes; 
1. The zone of movement of the employer or drivers. 
2. The zone of labor activity of the subject. 
Project: 
1. A set of documents (calculations and drawings) designed to create a structure or 
product. 
2. The text of a document that has already been drawn up but not verified. 
3. A pre-arranged plan for the performance of a particular task. 
An indicator is a criterion for a particular situation, action, process, event, type of 
activity. 
Level - a classification for the quantitative and qualitative assessment of certain 
indicators of a particular situation, action, process, event and type of activity. 


77 
Optimization is the selection and implementation of the most effective and optimal 
method for the level of a particular situation, action, process, event and type of activity 
(safety, productivity, productivity ...). 
An alternative is an alternative to two or more possible decisions, paths, methods, 
concepts, plans, or programs. 
Tree - the origin of certain indicators and the laws of relevance. 
Identification: 
1. Select the most alternative by analyzing the situation, situation, process, event and 
activity indicators. 
2. Determining the identity of an object or person based on general and specific 
characteristics. 
Technology: 
1. A set of methods, or rather a system, for the processing, preparation and 
modification of raw materials, materials or semi-finished products in the production 
process. 
2. The system of methods of organization, management, relevant activities of the 
educational process. 
Industrial sanitation is a system of organizational, hygienic, sanitary, technical 
measures and means that prevent workers from being exposed to harmful factors in 
production. 
Depending on the function of the alarm devices, they can be alarm, emergency, 
check and connect. According to the principle of operation, it is divided into light signal, 
sound signal, color and symbol signals. 
At a time of deepening globalization and increasing competitiveness of the national 
economy, the development of the telecommunications industry as a separate sector of 
the economy and the use of ICT in other sectors of the economy are becoming a priority. 
The expansion of technical capabilities and the full implementation of the potential of 


78 
this industry in practice will play an important role in strengthening the competitiveness 
of the national economy and thus ensure the strategic stability of private and public 
structures. 
In the last 10-year-period of the twentieth century, information and communication 
technologies (ICTs) have become one of the main factors influencing human's lifestyles 
and the development of society. Nowadays, as a result of the quick development of 
information and communication technologies in human society, profound changes are 
taking place in all spheres of human life. Information and communication technologies 
cover all aspects of human life, including activities, communication, and social and 
cultural spheres. They open up great opportunities for everyone to develop and improve 
their standard of living, and bring people out of loneliness and into the global 
information community. 
The Government of the Republic has created the important regulatory framework 
for ICT, which includes 11 specialized (sectoral) and 6 interconnected laws, 3 decrees 
of the President of the Republic of Uzbekistan, the Republic of Uzbekistan. Contains 
more than 40 resolutions of the President and the Cabinet of Ministers, as well as 600 
bylaws. 


79 
CONCLUSION. 
The president of the republic paid special attention to the creation of a reliable 
banking system in our country. PF-5992, the decree No. PF-5992 on "increasing the 
efficiency of the banking system by modernizing banking services, creating an effective 
infrastructure of banks and automating their activities, as well as gradually canceling 
functions that are not specific to the activities of banks, commercial enterprises with a 
state share comprehensive transformation of banks, introduction of modern standards 
of banking work, information technologies and software products, wide introduction of 
remote services for the population and small businesses, development of a network of 
low-cost service points, as well as mutual integration of the unified financial system of 
the republic as a complementary part, it is determined to develop a strategy for 
reforming the banking system of the Republic of Uzbekistan for 2020-2025 in order to 
increase the popularity and quality of financial services by creating favorable conditions 
for the formation and development of non-state bank credit organizations. 
One of the important tasks is to prevent cyber-attacks that may occur in the activities 
of commercial banks, which are highly digitized and online. 
Today's cyberthreats that have not bypassed every banking system are open mobile 
banking programs, aggressive banking malware, and DDoS attacks. To combat these 
attacks, automated banking systems have implemented additional security measures, 
such as digital tokens, one-time passwords, and two-factor authentication using unique 
codes sent to Android phones. However, since all information is transmitted over the 
Internet, the security risks of automated banking due to user acquisition and misuse of 
information do not stop from hacking threats and unauthorized access to banking 
systems. 


80 
In conclusion, it can be said that cyber-attacks on the automated banking system 
cannot be completely stopped, only by increasing the IT literacy of the automated 
banking system and its users, and by not leaving the security of the banking system 
unchecked, the negative results caused by the types of cyber-attacks can be significantly 
reduced.


81 
LIST OF USED SOURCES: 
1.https://www.softwareworld.co/best-banking-systems-software/#EBANQ 
2. https://www.upguard.com/blog/biggest-cyber-threats-for-financial-services 
3. https://www.analyticssteps.com/blogs/banking-artificial-intelligence-ai 
4. https://tadviser.com/index.php/Article:Bank_losses_from_cybercrime 
5. https://appinventiv.com/blog/ai-in-banking/ 
6. https://medium.com/@emily.h/how-the-banking-sector-can-combat-cyber-attacks-
a-checklist-byte-academy-f5bff63c2e1b 
7. https://www.microsoft.com/en-us/security/blog/2012/10/22/microsoft-free-security-
tools-microsoft-baseline-security-analyzer/ 
8.https://www.chtips.com/computer-fundamentals/advantages-and-disadvantages-of-
ssl/ 
9. https://bobcares.com/blog/advantages-and-disadvantages-of-ipsec/ 
10. 
https://medium.com/@passhot2000/detailed-interpretation-of-ipsec-protocol-
887e38c9287e 
11.https://medium.com/nerd-for-tech/artificial-intelligence-applications-in-financial-
services-8e2097b5f0bb 
12. https://medium.com/geekculture/list-of-the-best-banking-software-types-to-use-in-
2023-7895081b70f1 
13. https://diceus.com/oracle-flexcube-core-banking-expertise/ 
14. https://softwareconnect.com/financial-services/fundtech-cash-management/ 
15. https://pros-cons.net/pros-and-cons-of-tlstransport-layer-security/ 


82 
16.https://user3141592.medium.com/what-is-ssl-and-how-does-it-work-
a5465d19b494 
17. 
file:///C:/Users/User/Desktop/18..Bank-tizimi-avtomatlashtirilgan-axborot-
tizimlari-oquv-qollanma-Z.Sh_.Afzalov-T.-2006.pdf 
18. file:///C:/Users/User/Desktop/BOZAROVFARHOD%20(1).pdf 
19.file:///C:/Users/User/Desktop/ClassifyandAnalyzetheSecurityIssuesandChallengesi
nMobilebankinginUzbekistan.pdf 
20.file:///C:/Users/User/Desktop/O'zbekiston%20banklarida%20qo'llaniladigan%20da
sturiy%20ta'minotAvtomatl.pdf 
21. file:///C:/Users/User/Desktop/reserchmethodfinal.pdf 
22. 
https://cyberleninka.ru/article/n/banklarni-transformatsiya-ilish-sharoitida-
masofaviy-bank-hizmatlari-bilan-bo-li-risklarni-bosh-arish 
23. CYBER ATTACKS IN THE BANKING INDUSTRY. December 2020. 
24.Bank Automation. Data processing Systems and Associated Equipment. 1971
25. Core Banking Systems Primer. Apr 29. 2021 

Download 1.05 Mb.

Do'stlaringiz bilan baham:
1   ...   13   14   15   16   17   18   19   20   21




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling