“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR,
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI
www
.
bestpublishing.
org
161
REFERENCES:
1. Kim David. Fundamentals of Information Systems Security. -USA, 2014. -p.544.
2. Mark Stump. Information Security: principles and practice. -2nd ed. -USA, 2011. -
p.608.Akbarov D.E. Cryptographic methods of information security and their application. -
T .: Mark of Uzbekistan, 2009. -432 p.
“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR,
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI
www
.
bestpublishing.
org
162
THE MOST WEAKNESSES IN INFORMATION SECURITY OF INFORMATION
SYSTEMS. SOLVING INFORMATION PROTECTION PROBLEMS IN
INFORMATION SYSTEMS
Usmonov Maxsud Tulqin o‟g‟li
Tashkent University of Information Technologies
Karshi branch 3rd еar student
Abstract: Usually, information is passive, that is, motionless, unable to respond to
self-influence. Information systems, on the other hand, work on this information, draw the
necessary conclusions for useful work, and issue commands based on them. Information
systems often include security features. However, given that the main task of an information
system is to automate a process, the protection in it is not given too much importance. When
information attacks are more common on data warehouses, attacks on information systems
are usually carried out in order to stop them or reduce their efficiency.
Keywords: Causes of human-related vulnerabilities and ways to close them, Network-
related problems and solutions.
Do'stlaringiz bilan baham: |