Information security issues

Yüklə 167,95 Kb.
Pdf görüntüsü
ölçüsü167,95 Kb.
  1   2   3   4   5
Макола 1
ma\'lumot, Fraktal grafika dunyosida, МУНДАРИЖА, 1-mavzu algoritm xossalari

International Congress on Multidisciplinary Studies in Education and Applied Sciences
Berlin, Germany
June 3
Namangan Engineering Construction Institute 
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street 
Qozaqova Munojat Sharifjanovna 
Namangan Engineering Construction Institute 
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street 
Qosimov Muxammadjon 
Student, Namangan Engineering Construction Institute 
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street 
Chimberdiyev Shukurullo 
Student, Namangan Engineering Construction Institute 
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street 
The advent of Internet technology has increased the ability to access information from a 
variety of sources quickly and easily to an unprecedented extent for everyone - from ordinary 
citizens to large organizations. Government agencies, science and education institutions, 
commercial enterprises and individuals have begun to create and store information in 
electronic form. This environment offers great convenience compared to previous physical 
storage: storage is very compact, transmission takes place instantly, and the possibilities of 
accessing rich databases over the network are very wide. Opportunities for efficient use of 
information have led to a rapid increase in the amount of information. Business in a number 
of commercial areas today considers information to be its most valuable asset. This is 
definitely a very positive development when it comes to the media and information that 
everyone can know. But Internet technologies have created new challenges for convenience 
and confidential information flows, as well as convenience. The threat to information security 
in the Internet environment has increased dramatically. According to a 1999 survey by the 
U.S. Institute of Computer Security and the FBI on computer crime, 57 percent of 
organizations surveyed said their Internet connection was "a place where most attacks occur," 
and 30 percent said it was. and 26 percent reported that secret information was stolen during 
the attack. According to the U.S. Federal Center for Computer Crime - FedCIRC, in 1998, 
nearly 130,000 government networks with 1,100,000 computers were compromised. 
"Computer hacking" refers to the launch of a special program by people to gain unauthorized 
access to a computer. Forms of organizing such aggression are different. They are divided 
into the following types 
Remote access to a computer: Programs that allow you to access the Internet or intranet 
anonymously. Access to the computer on which it operates: based on access programs to the 
computer without identification. Disabling the computer remotely: Based on programs that 
connect to the computer remotely via the Internet (or network) and stop it or some of its 
programs (it is enough to restart the computer to start). Disabling the computer on which it is 
running: through disabling software. Network Scanners: In order to determine which of the 
computers and programs running on the network are vulnerable to intrusion, the network is 
actually through data-gathering software. Finding vulnerabilities in software: Through 
programs that search for vulnerabilities among large groups of computers on the Internet. 
Unlock password: by means of programs that search for passwords that can be easily found in 

Yüklə 167,95 Kb.

Dostları ilə paylaş:
  1   2   3   4   5

Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur © 2023
rəhbərliyinə müraciət

    Ana səhifə