Karshi branch of tashkent university of information technologies named after mukhammad al-khorezmi
Download 1.05 Mb. Pdf ko'rish
|
MAIN DIPLOMA WORK (2)....
5. VIPRE
You might have never heard about Vipre Antivirus, and that’s quite understandable. Even though the tool has received much praise from such independent testing organizations like AV-Comparatives, its name isn’t ingrained in the public consciousness just yet. In this Vipre Antivirus review, I’ll analyze this antimalware software in terms of features, virus detection rates, price, and ease of use. Let’s see whether Vipre truly deserves to explode in popularity in the future. Vipre pros and cons Pros • High virus detection rates • Lots of customization options • Many features • Ad and tracker blocking • The Bundle plan includes a VPN • Data breach scanner • A subscription covers five devices • 30-day free trial version Cons • Mixed results in phishing detection • Relatively high CPU usage during scans • No application for iOS • Significant price increase after the first year 75 Vipre security features Advanced Active Protection Vipre's Advanced Active Protection is just a fancy name for real-time protection, which is a core feature of any antivirus and antimalware application. And Vipre makes it work quite well. The antivirus scores really highly in the independent virus detection tests by AV- Comparatives. During the most recent testing period, it detected 96.8% of threats and produced only four false positives. In other words, Vipre has a very high chance of detecting a threat before it’s able to make any changes to your device. Device scans You can choose between a full scan, quick scan, and a custom scan. During the full scan, Vipre was using up to 4.9% CPU, which is quite a lot in comparison with other antivirus apps like McAfee. Also, even though you can see the history of the scans performed, there’s no way to see how long the scan lasted. The scans themselves are highly customizable. For example, you can scan removable drives, exclude various apps from scans, and let Vipre automatically perform a second layer scan if the quick scan spots a threat. When Vipre Antivirus detects malware, it immediately puts them into the quarantine folder. Here, you can see the type and threat level of the quarantined threat. 76 LIFE SAFETY It is known that any technical device has a danger zone. Danger zones are areas on the inside or outside of a machine or mechanism that pose a risk to a worker who is constantly or periodically working on it. Threats are halved into real and hidden. Therefore, the design of any machine must meet the following general and specific requirements: Specific requirements include lighting, noise, vibration and other parameters of the car within the sanitary and hygienic requirements, reliability of brakes, ease of operation and technical and aesthetic requirements. Safety measures and engineering. Risk reduction is mostly achieved through the following measures: - design and development of safe equipment; - use of engineering and technical means of risk protection; - Development and implementation of safe, modern technological processes; 1. The zone of movement of the employer or drivers. 2. The zone of labor activity of the subject. Project: 1. A set of documents (calculations and drawings) designed to create a structure or product. 2. The text of a document that has already been drawn up but not verified. 3. A pre-arranged plan for the performance of a particular task. An indicator is a criterion for a particular situation, action, process, event, type of activity. Level - a classification for the quantitative and qualitative assessment of certain indicators of a particular situation, action, process, event and type of activity. 77 Optimization is the selection and implementation of the most effective and optimal method for the level of a particular situation, action, process, event and type of activity (safety, productivity, productivity ...). An alternative is an alternative to two or more possible decisions, paths, methods, concepts, plans, or programs. Tree - the origin of certain indicators and the laws of relevance. Identification: 1. Select the most alternative by analyzing the situation, situation, process, event and activity indicators. 2. Determining the identity of an object or person based on general and specific characteristics. Technology: 1. A set of methods, or rather a system, for the processing, preparation and modification of raw materials, materials or semi-finished products in the production process. 2. The system of methods of organization, management, relevant activities of the educational process. Industrial sanitation is a system of organizational, hygienic, sanitary, technical measures and means that prevent workers from being exposed to harmful factors in production. Depending on the function of the alarm devices, they can be alarm, emergency, check and connect. According to the principle of operation, it is divided into light signal, sound signal, color and symbol signals. At a time of deepening globalization and increasing competitiveness of the national economy, the development of the telecommunications industry as a separate sector of the economy and the use of ICT in other sectors of the economy are becoming a priority. The expansion of technical capabilities and the full implementation of the potential of 78 this industry in practice will play an important role in strengthening the competitiveness of the national economy and thus ensure the strategic stability of private and public structures. In the last 10-year-period of the twentieth century, information and communication technologies (ICTs) have become one of the main factors influencing human's lifestyles and the development of society. Nowadays, as a result of the quick development of information and communication technologies in human society, profound changes are taking place in all spheres of human life. Information and communication technologies cover all aspects of human life, including activities, communication, and social and cultural spheres. They open up great opportunities for everyone to develop and improve their standard of living, and bring people out of loneliness and into the global information community. The Government of the Republic has created the important regulatory framework for ICT, which includes 11 specialized (sectoral) and 6 interconnected laws, 3 decrees of the President of the Republic of Uzbekistan, the Republic of Uzbekistan. Contains more than 40 resolutions of the President and the Cabinet of Ministers, as well as 600 bylaws. 79 CONCLUSION. The president of the republic paid special attention to the creation of a reliable banking system in our country. PF-5992, the decree No. PF-5992 on "increasing the efficiency of the banking system by modernizing banking services, creating an effective infrastructure of banks and automating their activities, as well as gradually canceling functions that are not specific to the activities of banks, commercial enterprises with a state share comprehensive transformation of banks, introduction of modern standards of banking work, information technologies and software products, wide introduction of remote services for the population and small businesses, development of a network of low-cost service points, as well as mutual integration of the unified financial system of the republic as a complementary part, it is determined to develop a strategy for reforming the banking system of the Republic of Uzbekistan for 2020-2025 in order to increase the popularity and quality of financial services by creating favorable conditions for the formation and development of non-state bank credit organizations. One of the important tasks is to prevent cyber-attacks that may occur in the activities of commercial banks, which are highly digitized and online. Today's cyberthreats that have not bypassed every banking system are open mobile banking programs, aggressive banking malware, and DDoS attacks. To combat these attacks, automated banking systems have implemented additional security measures, such as digital tokens, one-time passwords, and two-factor authentication using unique codes sent to Android phones. However, since all information is transmitted over the Internet, the security risks of automated banking due to user acquisition and misuse of information do not stop from hacking threats and unauthorized access to banking systems. 80 In conclusion, it can be said that cyber-attacks on the automated banking system cannot be completely stopped, only by increasing the IT literacy of the automated banking system and its users, and by not leaving the security of the banking system unchecked, the negative results caused by the types of cyber-attacks can be significantly reduced. 81 LIST OF USED SOURCES: 1.https://www.softwareworld.co/best-banking-systems-software/#EBANQ 2. https://www.upguard.com/blog/biggest-cyber-threats-for-financial-services 3. https://www.analyticssteps.com/blogs/banking-artificial-intelligence-ai 4. https://tadviser.com/index.php/Article:Bank_losses_from_cybercrime 5. https://appinventiv.com/blog/ai-in-banking/ 6. https://medium.com/@emily.h/how-the-banking-sector-can-combat-cyber-attacks- a-checklist-byte-academy-f5bff63c2e1b 7. https://www.microsoft.com/en-us/security/blog/2012/10/22/microsoft-free-security- tools-microsoft-baseline-security-analyzer/ 8.https://www.chtips.com/computer-fundamentals/advantages-and-disadvantages-of- ssl/ 9. https://bobcares.com/blog/advantages-and-disadvantages-of-ipsec/ 10. https://medium.com/@passhot2000/detailed-interpretation-of-ipsec-protocol- 887e38c9287e 11.https://medium.com/nerd-for-tech/artificial-intelligence-applications-in-financial- services-8e2097b5f0bb 12. https://medium.com/geekculture/list-of-the-best-banking-software-types-to-use-in- 2023-7895081b70f1 13. https://diceus.com/oracle-flexcube-core-banking-expertise/ 14. https://softwareconnect.com/financial-services/fundtech-cash-management/ 15. https://pros-cons.net/pros-and-cons-of-tlstransport-layer-security/ 82 16.https://user3141592.medium.com/what-is-ssl-and-how-does-it-work- a5465d19b494 17. file:///C:/Users/User/Desktop/18..Bank-tizimi-avtomatlashtirilgan-axborot- tizimlari-oquv-qollanma-Z.Sh_.Afzalov-T.-2006.pdf 18. file:///C:/Users/User/Desktop/BOZAROVFARHOD%20(1).pdf 19.file:///C:/Users/User/Desktop/ClassifyandAnalyzetheSecurityIssuesandChallengesi nMobilebankinginUzbekistan.pdf 20.file:///C:/Users/User/Desktop/O'zbekiston%20banklarida%20qo'llaniladigan%20da sturiy%20ta'minotAvtomatl.pdf 21. file:///C:/Users/User/Desktop/reserchmethodfinal.pdf 22. https://cyberleninka.ru/article/n/banklarni-transformatsiya-ilish-sharoitida- masofaviy-bank-hizmatlari-bilan-bo-li-risklarni-bosh-arish 23. CYBER ATTACKS IN THE BANKING INDUSTRY. December 2020. 24.Bank Automation. Data processing Systems and Associated Equipment. 1971 25. Core Banking Systems Primer. Apr 29. 2021 Download 1.05 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling