• REFERENCES
  • Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 http://innosci.org/
  • Nexus : Journal of Innovative Studies of Engineering Science ( JISES )




    Download 399.1 Kb.
    Pdf ko'rish
    bet2/2
    Sana13.11.2023
    Hajmi399.1 Kb.
    #98029
    1   2
    Bog'liq
    4.Ensuring Information Security in the Digital Economy Ways
    2004, Mavzu, ааааа, Microsoft Excel, nodira, 30-Informatika-microsoft-word-matn-muharririda-ishlash-2006-qollanma, 1 amaliy mash., 1 , Adhamov Muhammad, portal.guldu.uz-Photoshop, 1-mavzu kompyuter haqida tushuncha, sevinch ziyadullayeva.pdf, SATTOROVA IRB-123, Boyzoqov Murodjon
    Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) 
    Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 
    http://innosci.org/ 
    65 | Page 
    By the end of 2019, hackers will find systems with low security modern computers for automation 
    purposes expected to use learning tools.
    6. Developers of solutions in the field of cyber security cooperation and expansion of 
    cooperation between Cyber security for software developers the strengths and strengths of the 
    partnership companies unites Together, they not only combat malware, but also provide 
    effective solutions for learning and growth possible 
    7. Multi-factor authentication and smart device identification Identity is a key component of 
    cyber security, that's all including the Internet of Things. The ID model is now 2019 By then it 
    wasn't directed at the user - now it's at the machine directed. Analysts multi-factor 
    authentication and smart that identity will be the cornerstone of IoT cybersecurity in 2019 
    emphasizes.
    8. Protection based on machine learning Machine learning is already detecting malware is used 
    to monitor activity. Besides, this technology is more than traditional tools processes and 
    analyzes data faster, but also threats and also provides prediction of cyber attacks.
    9. Cyber security solutions built into the equipment Implementation of security at the hardware 
    level is the most of 2018 turned out to be one of the most exciting solutions, says the study. 
    This solve the problems of cloning and hacking of protection software and with unique 
    identification and provides secure authentication.
    10. To security personnel in the public and private sector increase in demand Confidential 
    information of users from companies New laws requiring protection are public and private has 
    created a huge demand for skilled security personnel in the sector.
    As practice shows, information protection both for the state as a whole, individual sectors of the 
    economy or is also relevant for companies. From a practical point of view, the world is changing, 
    some areas of information security are a thing of the past information security, depending on the 
    appearance of new ones concept is changing. Performed at the junction of PR and GR directly to 
    the country or business activity to be increased combating information interference remains a 
    separate task.
    Scientific research in the field of information security is no longer theoretical.
    Tasks are becoming more complex, most of them absolutely in new areas including: 
    geopolitical dominance
     development of cyber weapons; 
     crypto-currencies and tokens; 
    telemedicine
     virtualization time.
    Local developers are always developing technologies they do not keep pace with, but every year 
    information on the market new to solve security problems products appear.
    REFERENCES: 
    1. Абакумов П. А. Алгоритм выбора головного узла кластера сенсорной сети в трехмерном 
    пространстве. Электросвязь, №4, 2014.
    2. Абакумов П. А. Алгоритм кластеризации для мобильных беспроводных сенсорных 
    сетей в трехмерном пространстве/ П. А. Абакумов, А. Е. Кучерявый // Электросвязь, 
    №9, 2015.


    Nexus : Journal of Innovative Studies of Engineering Science ( JISES ) 
    Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578 
    http://innosci.org/ 
    66 | Page 
    3. A Hybrid Course Recommendation System by Integrating CollaborativeFiltering and Artificial 
    Immune Systems
    4. A Personalized Course Recommendation System Based on Career Goals
    5. Hybrid Educational Recommender System, Utilizing Student, Teacher andDomain Preferences 
    and Amazon Alexa Conversation Engine 
    6. Kulakov A. G. , Lando S. K. , Semyonov A. L. , Shen A. X. Algoritmika. V-V II sinflar. 
    Moskva: Drofa, 1997.

    Download 399.1 Kb.
    1   2




    Download 399.1 Kb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Nexus : Journal of Innovative Studies of Engineering Science ( JISES )

    Download 399.1 Kb.
    Pdf ko'rish