Konferensiyasi
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
Download 1.48 Mb. Pdf ko'rish
|
63ed0704130b8 19 respublika ilmiy onlayn 10-TA
- Bu sahifa navigatsiya:
- III. RESULTS
- IV. DISCUSSION
- V. CONCLUSION
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI www . bestpublishing. org 160 The element of legal protection of information means the legitimacy of the relationship between the organization and the state in the sense that the protection measures are justified, and that the staff follows the procedure for protecting the organization's valuable information and is responsible for violating it. Protection technology includes measures of a managerial and restrictive nature that encourage employees to adhere to the rules of protection of the organization's valuable information. An organizational security element is a factor that binds all other elements into a single system. According to many experts, organizational protection in information security systems is 50-60%. This depends on many factors, including the selection, placement and training of personnel who will implement the principles and methods of information security in practice. III. RESULTS Theoretically, there are four types of risks to these components: interruption, retention, modification, and forgery: - Interruption - is the temporary cessation of current operations using a central processing unit to perform some external action (works, processes), after which the processor returns to the previous state and resumes the suspended operation. Each interrupt has a sequence number, based on which the CPU device searches for the part-program for processing. Processors can create two types of interrupts: software and hardware. If a device needs emergency maintenance, there will be technical interruptions. Typically, such a delay is an unexpected event for the CPU. Program interrupts are performed using special commands of the processor within the main programs. In the event of a program interrupt, the program automatically pauses and performs the interrupt process. IV. DISCUSSION In organizations with complex content, a large number of automated information systems and large amounts of information, a comprehensive system of protection of information is created. However, this method and simple methods of protection should not interfere with the work of employees. The complexity of the protection system is achieved by the presence of legal, organizational, engineering, technical and software-mathematical elements. The proportions of the elements and their content ensure the uniqueness of the information security system of the organization and its uniqueness and difficulty of breaking. V. CONCLUSION The element of engineering and technical protection of information is designed to organize the protection of the territory, buildings and facilities with the help of a set of technical means, as well as for the slow and active fight against technical means of inspection. Although the cost of technical protection is high, this element is important in the protection of information systems. Download 1.48 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling