Nexus : Journal of Innovative Studies of Engineering Science ( JISES )
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578
http://innosci.org/
65 | Page
By the end of 2019, hackers will find systems with low security modern computers for automation
purposes expected to use learning tools.
6. Developers of solutions in the field of cyber security cooperation
and expansion of
cooperation between Cyber security for software developers the strengths and strengths of the
partnership companies unites Together, they not only combat malware,
but also provide
effective solutions for learning and growth possible
7. Multi-factor authentication and smart device identification Identity is a key component of
cyber security, that's all including the Internet of Things. The ID model is now 2019 By then it
wasn't directed at the user - now it's at the machine directed.
Analysts multi-factor
authentication and smart that identity will be the cornerstone of IoT cybersecurity in 2019
emphasizes.
8. Protection based on machine learning Machine learning is already detecting malware is used
to monitor activity. Besides, this technology is more than traditional tools processes and
analyzes
data faster, but also threats and also provides prediction of cyber attacks.
9. Cyber security solutions built into the equipment Implementation of security at the hardware
level is the most of 2018 turned out to be one of the most exciting solutions, says the study.
This solve the problems of cloning and hacking of protection software and with unique
identification and provides secure authentication.
10. To security personnel in the public and private sector increase
in demand Confidential
information of users from companies New laws requiring protection are public and private has
created a huge demand for skilled security personnel in the sector.
As practice shows, information protection both for the state as a whole, individual sectors of the
economy or is also relevant for companies. From a practical point of view, the world is changing,
some areas of information security are a thing of the past information security, depending on the
appearance of new ones concept is changing. Performed at the junction of PR and GR directly to
the country or business activity to be increased combating information interference remains a
separate task.
Scientific research in the field of information security is no longer theoretical.
Tasks are becoming more complex, most of them absolutely in new areas including:
geopolitical dominance;
development of cyber weapons;
crypto-currencies and tokens;
telemedicine;
virtualization time.
Local developers are always developing technologies they do not keep pace with, but every year
information on the market new to solve security problems products appear.
REFERENCES:
1. Абакумов П. А. Алгоритм выбора головного узла кластера сенсорной сети в трехмерном
пространстве.
Электросвязь, №4, 2014.
2. Абакумов П. А. Алгоритм кластеризации для мобильных беспроводных сенсорных
сетей в трехмерном пространстве/ П. А. Абакумов, А. Е. Кучерявый // Электросвязь,
№9, 2015.
Nexus : Journal of Innovative Studies of Engineering Science ( JISES )
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578
http://innosci.org/
66 | Page
3. A Hybrid Course Recommendation System by Integrating CollaborativeFiltering and Artificial
Immune Systems
4. A Personalized Course Recommendation System Based on Career Goals
5. Hybrid Educational Recommender System,
Utilizing Student, Teacher andDomain Preferences
and Amazon Alexa Conversation Engine
6. Kulakov A. G. , Lando S. K. , Semyonov A. L. , Shen A. X. Algoritmika. V-V II sinflar.
Moskva: Drofa, 1997.