40
world market,
and to ensure the collection, storage and effective
use of local information
resources;
- Threats to the normal functioning of information and
telecommunications systems
implemented and created on the territory of the republic, the security of information resources.
Therefore, the protection of information systems should be carried
out taking into account the
above information.
Conclusion. The study analyzed the security parameters in the protection of information
systems. At the same time, organizations that provide information about the types and methods
of
repelling network attacks, threats to information
security and their types,
the concept and
structure of threats to protected information were systematized.
References:
1. Тутубалин П. И., Кирпичников А. П. Оценка криптографической стойкости
алгоритмов асимметричного шифрования. Вестник технологического университета. Т.20,
№10, c. 94-99, 2017.
ELEKTRON TA‘LIM TIZIMINING AFZALLIKLARI VA KAMCHILIKLARI.
To‗ychiyeva Nodira
Norbekov Xursandmurod
―Iqtisodiyot‖ kafedrasi assistenti
UZMU Jizzax filiali, Jizzax sh.
Annotatsiya. Bugungi globallashuv jarayonida ta‘limning jadal elektronlashib
borayotganiga barchamiz birdek guvoh bo‗lmoqdamiz. Elektron ta‘lim tizimi o‗quvchilarga
barcha o‗quv materiallaridan to‗plangan bilimlarni turli test to‗plamlaridan foydalangan holda
o‗z-o‗zini tekshirish va shu material ustida qayta ishlash imkoniyatini bermoqda. Ta‘limda ham
bir muncha murakkabliklar paydo bo‗layotgan bir paytda elektron ta‘lim vositalari o‗quvchining
o‗zlashtirish xususiyatini anchagina yengillashtirmoqda desak yanglishmagan bo‗lamiz. Ushbu
maqolada elektron ta‘limdan foydalanishning hamda uning muhimligi haqida so‗z boradi.