Konferensiyasi


TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE


Download 1.48 Mb.
Pdf ko'rish
bet10/36
Sana25.10.2023
Hajmi1.48 Mb.
#1720390
1   ...   6   7   8   9   10   11   12   13   ...   36
Bog'liq
63ed0704130b8 19 respublika ilmiy onlayn 10-TA

TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
160 
The element of legal protection of information means the legitimacy of the relationship 
between the organization and the state in the sense that the protection measures are justified, 
and that the staff follows the procedure for protecting the organization's valuable 
information and is responsible for violating it. 
Protection technology includes measures of a managerial and restrictive nature that 
encourage employees to adhere to the rules of protection of the organization's valuable 
information. 
An organizational security element is a factor that binds all other elements into a single 
system. According to many experts, organizational protection in information security 
systems is 50-60%. This depends on many factors, including the selection, placement and 
training of personnel who will implement the principles and methods of information 
security in practice. 
III. RESULTS 
Theoretically, there are four types of risks to these components: interruption, retention, 
modification, and forgery: 
- Interruption - is the temporary cessation of current operations using a central 
processing unit to perform some external action (works, processes), after which the 
processor returns to the previous state and resumes the suspended operation. Each interrupt 
has a sequence number, based on which the CPU device searches for the part-program for 
processing. Processors can create two types of interrupts: software and hardware. If a device 
needs emergency maintenance, there will be technical interruptions. Typically, such a delay 
is an unexpected event for the CPU. Program interrupts are performed using special 
commands of the processor within the main programs. In the event of a program interrupt, 
the program automatically pauses and performs the interrupt process. 
IV. DISCUSSION 
In organizations with complex content, a large number of automated information 
systems and large amounts of information, a comprehensive system of protection of 
information is created. However, this method and simple methods of protection should not 
interfere with the work of employees. 
The complexity of the protection system is achieved by the presence of legal, 
organizational, engineering, technical and software-mathematical elements. The proportions 
of the elements and their content ensure the uniqueness of the information security system 
of the organization and its uniqueness and difficulty of breaking. 
V. CONCLUSION 
The element of engineering and technical protection of information is designed to 
organize the protection of the territory, buildings and facilities with the help of a set of 
technical means, as well as for the slow and active fight against technical means of 
inspection. Although the cost of technical protection is high, this element is important in the 
protection of information systems. 

Download 1.48 Mb.

Do'stlaringiz bilan baham:
1   ...   6   7   8   9   10   11   12   13   ...   36




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling