|
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINEBog'liq 63ed0704130b8 19 respublika ilmiy onlayn 10-TA шахриёр диссертация, МАЖМУА 2022-23, 1-qoldirilgan dars maruza, Лабаротория № 2, togri javoblar, Erkinov Muhammadali, fizika 2 mavzu 10, KATTA ASHULA VA UNING IJROCHILIK ANANALARI, Sobirjon KURS ISHI, 3-topshiriq, IQTISODIYOTDA AXBOROT-KOMMUNIKATSIYA TEXNOLOGIYALAR VA TIZIMLARTAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI
www
.
bestpublishing.
org
160
The element of legal protection of information means the legitimacy of the relationship
between the organization and the state in the sense that the protection measures are justified,
and that the staff follows the procedure for protecting the organization's valuable
information and is responsible for violating it.
Protection technology includes measures of a managerial and restrictive nature that
encourage employees to adhere to the rules of protection of the organization's valuable
information.
An organizational security element is a factor that binds all other elements into a single
system. According to many experts, organizational protection in information security
systems is 50-60%. This depends on many factors, including the selection, placement and
training of personnel who will implement the principles and methods of information
security in practice.
III. RESULTS
Theoretically, there are four types of risks to these components: interruption, retention,
modification, and forgery:
- Interruption - is the temporary cessation of current operations using a central
processing unit to perform some external action (works, processes), after which the
processor returns to the previous state and resumes the suspended operation. Each interrupt
has a sequence number, based on which the CPU device searches for the part-program for
processing. Processors can create two types of interrupts: software and hardware. If a device
needs emergency maintenance, there will be technical interruptions. Typically, such a delay
is an unexpected event for the CPU. Program interrupts are performed using special
commands of the processor within the main programs. In the event of a program interrupt,
the program automatically pauses and performs the interrupt process.
IV. DISCUSSION
In organizations with complex content, a large number of automated information
systems and large amounts of information, a comprehensive system of protection of
information is created. However, this method and simple methods of protection should not
interfere with the work of employees.
The complexity of the protection system is achieved by the presence of legal,
organizational, engineering, technical and software-mathematical elements. The proportions
of the elements and their content ensure the uniqueness of the information security system
of the organization and its uniqueness and difficulty of breaking.
V. CONCLUSION
The element of engineering and technical protection of information is designed to
organize the protection of the territory, buildings and facilities with the help of a set of
technical means, as well as for the slow and active fight against technical means of
inspection. Although the cost of technical protection is high, this element is important in the
protection of information systems.
|
| |