Nexus : Journal of Innovative Studies of Engineering Science ( JISES )
Volume: 02 Issue: 06 | 2023 ISSN: 2751-7578
http://innosci.org/
64 | Page
Ensuring Information Security in the Digital Economy Ways
Tojiyev Nuriddin Shukur o‘g‘li
Teacher, Institute of Economics and service, Samarkand
Abdualimov Shoxzod Alijon o‘g‘li
Student, Institute of Economics and service
Adilova Dinora Ablaqul qizi
Samarkand State University, student
Annotation:
Success in ensuring information security and protection, first of all, it
depends on the security policy developed in the enterprise. The information security policy of the
enterprise is valuable information security that governs management, rotection and distribution is
a set
of instructions, rules, procedures and practices.
Key words:
Information Warfare, Cyber Security, New Technologies, Modern Conflicts.
Formation
of digital economy, technical and technological base development and increasingly
serious threats decisions related to information security professionals in the field and is demanding
the acceptance of projects. For example, February 2019 Counterpoint
Technology Market
Research analyst at the beginning of the month company in the field of information security for
2019 presented the forecast.
1. Close care among hackers. Hackers are divided into different groups: traditional and
ideological, government-sponsored and independent hackers. According to analysts According
to this, these groups will soon be the product of others and start
cooperation to use their
services. Counterpoint Technology Market Research Researchers 2019 in IoT-devices,
platforms, cloud systems and services a significant increase in capital expenditures for security
are waiting
2. Organization of cyber attacks as a service. According to experts, hackers are harmful in 2019
remote work as a starting point for software distribution use table protocols. Besides, software
for cybercriminals to launch malware can create and sell supply packages that give them their
selection of ready-made products, regardless of experience in this
field and allows attacks to
be launched.
3. Machine learning as a weapon of the new generation. Malware is already deployed cyber
defense bypassing machine learning elements in systems learned Experts say that the next step
is hackers modern computers to automate targeting learning tools will be used. Such tools to
find low-security systems and their vulnerabilities will be able to learn software.
4. Data theft The transition to digital technology and the Internet of Things is in the cloud of the
amount of corporate and personal data stored led to an increase. Significant increase in data
breaches Expected in 2019, especially cloud servers.
5. Smart home devices and external devices to attacks becomes defenseless against.
A smart
home that collects and stores personal data devices are easy targets for cyber attack because
they are usually not nearly as safe. Peripheral devices confidential information equipped with
very simple software for protection and works mainly in primary operating systems.