• III. RESULTS
  • IV. DISCUSSION
  • V. CONCLUSION
  • “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR




    Download 1.48 Mb.
    Pdf ko'rish
    bet13/36
    Sana22.07.2023
    Hajmi1.48 Mb.
    #77142
    1   ...   9   10   11   12   13   14   15   16   ...   36
    Bog'liq
    63ed0704130b8 19 respublika ilmiy onlayn 10-TA
    шахриёр диссертация, МАЖМУА 2022-23, 1-qoldirilgan dars maruza, Лабаротория № 2, togri javoblar, Erkinov Muhammadali, fizika 2 mavzu 10, KATTA ASHULA VA UNING IJROCHILIK ANANALARI, Sobirjon KURS ISHI, 3-topshiriq, IQTISODIYOTDA AXBOROT-KOMMUNIKATSIYA TEXNOLOGIYALAR VA TIZIMLAR
    “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
    TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
    KONFERENSIYASI 
    www
    .
    bestpublishing.
    org
    163 
    to all users. It is not always possible to identify an external customer who accesses the 
    system in the process of communicating over the network. This is because there are now 
    thousands of opportunities to disguise themselves, so the chances of attacking systems are 
    just as high. Only a very powerful control system can save it from attacks. However, it is 
    not possible to install such protection on every system, because sometimes some of the 
    information is public or strong protection is self-sustaining. and sometimes technical
    software, or financial deficiencies. At present, this problem is solved by creating corporate 
    systems, as this system unites local networks in all production departments, including large-
    scale or large-scale production, and provides centralized protection and security of 
    interactions. provides. 
    Another problem for our country today is the computer and the devices connected to it, 
    the parts of which are sometimes imported from different countries, the quality is different, 
    and sometimes it is not known where they are produced (perhaps counterfeited by domestic 
    companies), one Because the parameters in the assembly process do not match in the first 
    place, and the position does not have the required parameters even when adjusted, it either 
    runs slowly, or fails quickly, or causes frequent errors in the operation, or leads to other 
    problems. . Therefore, it is not possible to require a certain normal operation of such a 
    maintenance system. In general, the situation with software is no better, because the phrase 
    "pirated copy", which has become a phrase of the day, can mean only one world. This 
    situation can be added to the weaknesses of information systems without fear. 
    III. RESULTS 
    Another weakness of information security is the role of security policy in current 
    corporate governance policy. Of course, when starting a business, every leader or 
    management not only agrees with the above considerations, but also that security policy is 
    an integral part of management, in short, all the requirements and conditions necessary for 
    information security, but more (usually wholeheartedly) promises, but in the course of the 
    work this problem is pushed to the ranks of the secondary, and this continues until there is 
    an emergency, a great loss. Now, we, the security guards and the authorities, will be the first 
    to appear on the scene (because the mother does not give milk if the baby does not cry!). 
    With that in mind, it's good to know that being too humble and "polite" in dealing with 
    management can be harmful. 
    IV. DISCUSSION 
    We've looked at the indirect weaknesses of information technology above, and now 
    let's discuss their immediate weaknesses. As we have seen, the share of unintentional 
    behavior in system failures is very high. Because the system is not a single user, there are 
    usually several users on the list whose content changes frequently. Depending on the 
    characteristics of the mood, health or mood, even an experienced consumer can work with 
    different levels of productivity or diligence.
    V. CONCLUSION 
    Another vulnerability is software bugs, especially system and operating system errors. 
    For example, the National Infrastructure Protection Center (NIPC) of the United States on 
    June 21, 1999 From July 3 to July 16 this year, there were nine problems with the software, 



    Download 1.48 Mb.
    1   ...   9   10   11   12   13   14   15   16   ...   36




    Download 1.48 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR

    Download 1.48 Mb.
    Pdf ko'rish