• III. RESULTS
  • IV. DISCUSSION
  • V. CONCLUSION
  • TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE




    Download 1.48 Mb.
    Pdf ko'rish
    bet10/36
    Sana22.07.2023
    Hajmi1.48 Mb.
    #77142
    1   ...   6   7   8   9   10   11   12   13   ...   36
    Bog'liq
    63ed0704130b8 19 respublika ilmiy onlayn 10-TA
    шахриёр диссертация, МАЖМУА 2022-23, 1-qoldirilgan dars maruza, Лабаротория № 2, togri javoblar, Erkinov Muhammadali, fizika 2 mavzu 10, KATTA ASHULA VA UNING IJROCHILIK ANANALARI, Sobirjon KURS ISHI, 3-topshiriq, IQTISODIYOTDA AXBOROT-KOMMUNIKATSIYA TEXNOLOGIYALAR VA TIZIMLAR
    TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
    KONFERENSIYASI 
    www
    .
    bestpublishing.
    org
    160 
    The element of legal protection of information means the legitimacy of the relationship 
    between the organization and the state in the sense that the protection measures are justified, 
    and that the staff follows the procedure for protecting the organization's valuable 
    information and is responsible for violating it. 
    Protection technology includes measures of a managerial and restrictive nature that 
    encourage employees to adhere to the rules of protection of the organization's valuable 
    information. 
    An organizational security element is a factor that binds all other elements into a single 
    system. According to many experts, organizational protection in information security 
    systems is 50-60%. This depends on many factors, including the selection, placement and 
    training of personnel who will implement the principles and methods of information 
    security in practice. 
    III. RESULTS 
    Theoretically, there are four types of risks to these components: interruption, retention, 
    modification, and forgery: 
    - Interruption - is the temporary cessation of current operations using a central 
    processing unit to perform some external action (works, processes), after which the 
    processor returns to the previous state and resumes the suspended operation. Each interrupt 
    has a sequence number, based on which the CPU device searches for the part-program for 
    processing. Processors can create two types of interrupts: software and hardware. If a device 
    needs emergency maintenance, there will be technical interruptions. Typically, such a delay 
    is an unexpected event for the CPU. Program interrupts are performed using special 
    commands of the processor within the main programs. In the event of a program interrupt, 
    the program automatically pauses and performs the interrupt process. 
    IV. DISCUSSION 
    In organizations with complex content, a large number of automated information 
    systems and large amounts of information, a comprehensive system of protection of 
    information is created. However, this method and simple methods of protection should not 
    interfere with the work of employees. 
    The complexity of the protection system is achieved by the presence of legal
    organizational, engineering, technical and software-mathematical elements. The proportions 
    of the elements and their content ensure the uniqueness of the information security system 
    of the organization and its uniqueness and difficulty of breaking. 
    V. CONCLUSION 
    The element of engineering and technical protection of information is designed to 
    organize the protection of the territory, buildings and facilities with the help of a set of 
    technical means, as well as for the slow and active fight against technical means of 
    inspection. Although the cost of technical protection is high, this element is important in the 
    protection of information systems. 

    Download 1.48 Mb.
    1   ...   6   7   8   9   10   11   12   13   ...   36




    Download 1.48 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE

    Download 1.48 Mb.
    Pdf ko'rish