I. INTRODUCTION
The protection system should be continuous, planned, centralized, targeted, accurate,
reliable, comprehensive, easy to upgrade and quick to change appearance. It usually needs
to be effective in all extreme conditions.
In organizations with a small amount of information, it is advisable and effective to
use simple methods of data protection. For example, the segregation and masking of
readable securities and electronic documents, the appointment and training of staff working
with these documents, the organization of security of the building, the obligation not to
distribute valuable information to employees, control over visitors, computer use the
simplest methods of protection, and so on. Usually, the simplest methods of protection work
best.
II. METHODS
In organizations with complex content, a large number of automated information
systems and large amounts of information, a comprehensive system of protection of
information is created. However, this method and simple methods of protection should not
interfere with the work of employees.
The complexity of the protection system is achieved by the presence of legal,
organizational, engineering, technical and software-mathematical elements. The proportions
of the elements and their content ensure the uniqueness of the information security system
of the organization and its uniqueness and difficulty of breaking.
A real system can be thought of as made up of many different elements. The content of
the elements of the system depends not only on its specificity, but also on the value of the
information and determines the level of protection set, taking into account the value of the
system.
“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR,
Do'stlaringiz bilan baham: |