• Nazorat savollari
  • FOYDALANILGAN ADABIYOTLAR
  • Vazirligi muhammad al-xorazmiy nomidagi toshkent




    Download 2,03 Mb.
    bet96/111
    Sana20.05.2024
    Hajmi2,03 Mb.
    #246571
    1   ...   92   93   94   95   96   97   98   99   ...   111
    Mahsulot Xususiyati

    McAfee AntiVirus Plus

    Semantec Norton AntiVirus Plus

    Kaspersky Anti- Virus

    Bitdefender Antivirus Plus

    Webroot SecureAnywhere
    Antivirus

    Eset Nod32 Antivirus

    Trend Micro Antivirus+ Security

    F-secure Anti-Virus

    VoodooSoft VoodooShield

    The Kure

    Narxi

    19.99$

    19.99$

    29.99$

    29.99$

    18.99$

    27.99$

    29.95$

    39.99$

    19.99$

    19.99$

    Talabga ko‘ra
    skanerlash

    +


    +


    +


    +


    +


    +


    +


    +


    -


    -


    Doimiy
    skanerlash

    +

    +

    +

    +

    +

    +

    +

    +

    +

    -

    Web saytni
    baholash

    +

    +

    +

    -

    +

    -

    +

    -

    -

    -

    Zararli URL ni
    bloklash

    +


    +


    +


    +


    +


    +


    +


    +


    -


    -


    Fishingdan
    himoyalash

    +

    +

    +

    +

    +

    +

    +

    -

    -

    -

    Xususi- yatga ko‘ra
    aniqlash

    +


    +


    +


    +


    +


    +


    +


    +


    +


    -


    Zaifliklarni
    skanerlash

    +

    -

    +

    +

    -

    -

    -

    -

    -

    -



    Profilaktik choralar. Viruslar va virus yuqtirilgan fayllarni o‘z vaqtida aniqlash, aniqlangan viruslarni har bir kompyuterda to‘liq yo‘q qilish orqali virus epidemiyasining boshqa kompyuterlarga tarqalishini
    oldini olish mumkin. Har qanday virusni aniqlaydigan va yo‘q qilinishini kafolatlaydigan mutlaqo ishonchli dasturlar mavjud emas. Kompyuter viruslariga qarshi kurashishning muhim usuli - o‘z vaqtida profilaktika qilishdir. Virusdan zararlanish ehtimolini sezilarli darajada kamaytirish va disklarda ma’lumotlarning ishonchli saqlanishini ta’minlash uchun quyidagi profilaktik choralar ko‘rilishi kerak:

    • faqat litsenziyali dasturiy ta’minotdan foydalanish;

    • kompyuterni zamonaviy antivirus dasturiy vositasi bilan ta’minlash va uni muntazam yangilab borish;

    • boshqa komyuterdan yozib olingan ma’lumotlarni o‘qishdan oldin har bir saqlagichni antivirus tekshiruvidan o‘tkazish;

    • arxivlangan fayllarni ajratgandan so‘ng skanerlashni amalga oshirish;

    • kompyuter disklarini takroriy antivirus dasturlari tekshiruvidan o‘tkazish;

    • kompyuter tarmoqlaridan olingan barcha bajariladigan fayllarni nazoratlashda antivirus dasturidan foydalanish.



    Nazorat savollari


    1. Dasturiy mahsulotlarda xavfsizlik ta’minlanishining muhimligi.

    2. Dasturiy mahsulotlarda xavfsizlik muammolarining kelib chiqish sabablari.

    3. Nuqson, bag, xotirani to‘lib toshishi tushunchalari.

    4. Dasturiy vosita xavfsizligini fundamental prinsiplari.

    5. Dasturiy vositalarga qo‘yilgan talablar.

    6. Dasturiy vositalarga qo‘yilgan xavfsizlik talablari.

    7. Dasturiy vositalar xavfsizligini ta’minlashda dasturlash tillarining o‘rni.

    8. Xavfsiz va xavfsiz bo‘lmagan dasturlash tillari.

    9. Zararli dasturlar va ularning asosiy turlari.

    10. Kompyuter viruslari nima?

    11. Zararli dasturiy vositalardan himoyalanish usullari va vositalari.

    12. Antivirus dasturiy vositalarini tanlashdagi talablar.

    FOYDALANILGAN ADABIYOTLAR


    1. S.K.Ganiev, T.A.Kuchkarov. Tarmoq xavfsizligi (Mobil tarmoq xavfsizligi). O‘quv qo‘llanma. –T.: «Aloqachi», 2019, 140 b.

    2. S.K.Ganiev, M.M.Karimov, Z.T.Xudoyqulov, M.M.Kadirov. Axborot xavfsizligi bo‘yicha atama va tushunchalarning rus, o‘zbek va ingliz tillaridagi izohli lug‘ati. –T.: «Iqtisod-moliya», - 2017, 480 bet.

    3. S.K.Ganiev, M.M.Karimov, K.A.Tashev. Axborot xavfsizligi.

    –T.: «Fan va texnologiya», 2016, 372 bet.

    1. S.K.Ganiev, M.M.Karimov, K.A.Tashev. Axborot xavfsizligi. Axborot-kommunikatsion tizimlar xavfsizligi. O‘quv qo‘llanma. –T.:

    «Aloqachi», 2008, 382 bet.

    1. Stamp M. Information security: principles and practice // John Wiley & Sons, 2011, -P. – 606.

    2. Марков А. С., Барабанов А. В., Дорофеев А. В., Цирлов В.Л. Семь безопасных информационных технологий / под ред. А.С.Маркова. –М.: ДМК Пресс, -2017. – 224с.

    3. D.Y.Akbarov, P.F.Xasanov, X.P.Xasanov, O.P.Axmedova, I.U.Xolimtoyeva. Kriptografiyaning matematik asoslari. O‘quv qo‘llanma. –T.: «Aloqachi», 2019, 192 bet.

    4. Akbarov D.Y. Axborot xavfsizligini ta’minlashning kriptografik usullari va ularning qo‘llanilishi // Toshkent, 2008, 394 bet.

    5. Шаньгин, В. Ф. Информационная безопасность компьютерных систем и сетей : учеб. пособие / В.Ф. Шаньгин. — Москва : ИД «ФОРУМ» : ИНФРА-М, 2017. — 416 с.

    6. Raef Meeuwisse. Cybersecurity for Beginners (2nd. ed.). Cyber Simplicity Ltd, London, England, 2017, - 224 p.

    7. Manjikian M. Cybersecurity ethics: an introduction. – Routledge, 2017, -328 p.

    8. Kostopoulos G. Cyberspace and cybersecurity. – CRC Press, 2017, -316 r.

    9. Christen M., Gordijn B., Loi M. The Ethics of Cybersecurity.

    • Springer Nature, 2020. – S. 384.

    1. Pande J. Introduction to Cyber Security. Uttarakhand Open University, 2017, -152 p.

    2. Cybersecurity Fundamentals Study Guide, ISACA 2015, -196

    p.

    1. Easttom C. Computer security fundamentals. – Pearson IT

    Certification, 2019, -447 p.

    1. Введение в информационную безопасность автоматизированных систем: учебное пособие / В. В. Бондарев. — Москва : Издательство МГТУ им. Н. Э. Баумана, 2016. — 250 с.

    2. Shinder D. L., Cross M. Scene of the Cybercrime. – Elsevier, 2008.

    3. Scarfone K. et al. Guide to storage encryption technologies for end user devices //NIST Special Publication. – 2007. – T. 800. – S. 111.

    4. Curricula Cybersecurity. Curriculum guidelines for post- secondary degree programs in cybersecurity. – 2017.

    5. Purdy G. ISO 31000: 2009—setting a new standard for risk management //Risk Analysis: An International Journal. – 2010. – T. 30. –

    №. 6. – S. 881-886.

    1. Zlatanov N. Hard Disk Drive and Disk Encryption, 2015, DOI: 10.13140/RG.2.1.1228.9681.

    2. Ganiev S.K., Khudoykulov Z.T., Islomov Sh.Z., Selection suitable biometrics for cryptographic key generators // TUIT BULLETIN, Tashkent, 2016, №4 (40), – P. 80-92

    3. Rathgeb C., Uhl A. A survey on biometric cryptosystems and cancelable biometrics //EURASIP Journal on Information Security, 2011, №1, – P. 1-25.

    4. Report to Congress on Breaches of Unsecured Protected Health Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health and Human Services Office for Civil Rights. https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015- 2016-2017.pdf

    Download 2,03 Mb.
    1   ...   92   93   94   95   96   97   98   99   ...   111




    Download 2,03 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Vazirligi muhammad al-xorazmiy nomidagi toshkent

    Download 2,03 Mb.