|
Ichki tahdidlar asosan qanday amalga oshiriladi?
|
bet | 3/3 | Sana | 25.05.2024 | Hajmi | 263,1 Kb. | | #253642 |
Bog'liq 10-Identifikasiya va autentifikasiya vositalari2. Ichki tahdidlar asosan qanday amalga oshiriladi?
Insayderlar Tarmoq uzilishi Tahlil orqali Barchasi noto’g’ri |
Sabotaj qanday amalga oshiriladi?
|
Тушинчалар таҳлили
|
Zarar yetkazuvchi dasturlar quyidagi jihatlari bilan ajralib turadilar bular qaysilar?
|
??????????????????????????????????????????????????????????????
- Nazorat uchun savollar:
- Simmetrik kriptotizimlar tarixi?
- Simmetrik kriptotizimlar haqida asosiy ma'lumotlar?
- Simmetrik shifrlarning turlari?
- Simmetrik kriptotizimlar afzalliklari Kamchiliklari/
- ADABIYOTLAR
- Cybersecurity Curricula 2017 – Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity (ACM, IEEE-CS, AIS SIGSEC, IFIP WG 11.8) (Crosscutting concepts).
- M.Stamp. Information security. Principles and Practice. Second Edition. ISBN 978-0-470-62639-9. 2011.
- QO‘ShIMChA ADABIYoTLAR
- CISSP Official Study Guide (Mike Chapple, James Michael Stewart, Darril Gibson) (2018, Sybex)
- Official ISC2 Guide to the CSSLP CBK
- ISO/IEC 27000 Information technology. Security techniques. Information security management systems. Overview and vocabulary. (или эквивалент).
- INTERNET SAYTLARI
- https://geekflare.com/understanding-cybersecurity/
- https://d3alc7xa4w7z55.cloudfront.net/static/upload/protected/201/0114/2015-osspaloalto1-cybersecurity-for-dummies.pdf
- https://opendatasecurity.io/wp-content/uploads/2017/11/Cybersecurity_Guide_For_Dummies_Compressed.pdf
ЭЪТИБОРИНГИЗ УЧУН РАХМАТ!!!
|
| |