• Yunusova D.
  • Kalit so’zlar
  • IoT muhiti xavfsizligining zaif tomonlari va uning oldini olishning bir qancha yechimlari




    Download 16.52 Kb.
    bet1/2
    Sana15.01.2024
    Hajmi16.52 Kb.
    #137560
      1   2
    Bog'liq
    Cybersecurity
    iImvbPeFjpDl1vQWrSLx2XbY5PD18U1VnfhvY8jz, An-Introduction-to-Franchising, Дизайн без названия (1), 1711641789

    IoT muhiti xavfsizligining zaif tomonlari va uning oldini olishning bir qancha yechimlari


    Usmanova N.
    Fan Doktori, Professor,
    Telekommunikatsiya texnologiyalari kafedrasi,
    Toshkent axborot texnologiyalari universiteti


    Yunusova D.
    Telekommunikatsiya texnologiyalari magistri
    Toshkent axborot texnologiyalri universiteti


    Annotatsiya
    Raqamli iqtisodiyot ko'lamini tobora kengaytirish nuqtai nazaridan, ilovalarni tegishli ravishda taqdim etishga imkon beruvchi murakkab IoT tarmoq muhiti tarkibiy qismlarining samarali ishlashi yo'llarini aniqlash muhim, IoT esa narsalar istalgan vaqtda mavjud bo'ladi degan fikrga asoslanadi. , har qanday joyda va har kim uchun yagona tizimga birlashadi va shu bilan turli xil ilovalar domenlari uchun yangi imkoniyatlar va qiyinchiliklarni yaratadi. Ushbu maqolada IoT muhitidagi zaifliklar va ularning yechimlari ko'rib chiqiladi.
    Kalit so’zlar: IoT, IIoT (sanoat IoTi), zaifliklar, tahdidlar, 5G, autentifikatsiya, parol gigienasi.
    Overview of Cyber Security
    In the present world where cyber attackers are well equipped with state-of-the-art and sophisticated technologies, the risk for hacks and security breaches is at its peak. For this particular reason, security protocols need to be in place. And what is better than countering hacking with hacking itself. This is where Ethical Hacking comes to play. This highly technical job is aimed to prevent security breaches, and being government-approved, the pay is pretty high.
    There was a huge data breach of 50 million Facebook accounts recently happened in March 2018 by a firm known as Cambridge Analytic which harvested data for US Election Predictions. The data breach came to the limelight and Facebook has levied a fine since they didn’t protect user details and due to their lack of transparency in the system. Imagine such a big firm like Facebook is susceptible to such data breaches, so Cyber security is an important measure for every organization. Cyber security is used to avoid data breaches, and protect the integrity of networks and systems from attacks.
    What is Cyber Security?
    Cyber Security is similar to physical security or any other type of security for that matter. Physical security helps in protecting physical properties and other valuables and prevents humans from performing any accidental damage or crime on those. In the same way, Cyber Security allows organizations to protect their computer systems, end-user applications, data privacy, etc. from any form of malicious cyberattacks and other external threats.
    The main aim of this technology is to avoid cybercriminals and attackers from accessing, corrupting, or making any changes to the systems, applications, and data of an organization.

    Difference between Hacking and Ethical Hacking




    Download 16.52 Kb.
      1   2




    Download 16.52 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    IoT muhiti xavfsizligining zaif tomonlari va uning oldini olishning bir qancha yechimlari

    Download 16.52 Kb.