Protection of data from malicious threats in the protection system
Journal: Science and Education (Vol.3, No. 11)Publication Date: 2022-11-25
Authors : Murod Boboqulov;
Page : 413-421
Keywords : DBMS; information security; complex security; protection system; threat; risk;
Abstract
The disadvantages and advantages of the risk measurement methods
used in the integrated protection system will be highlighted, recommendations and classification of potential intruders when creating a security mechanism in the organization will be given. One of the techniques for analyzing systemic protections will be the creation of a dynamic movement of a complex system, in addition to which it will be considered what needs to be taken into account when assessing risks and what parameters to calculate. Particular attention will be paid to the creation of methods and technologies for creating software for detecting and reducing risks based on motion maps.
Other Latest Articles
- Data processing and information security in the structure of ecological information systems
- Synthesis, Characterization and Antimicrobial Activity of Isoxazoline Derivatives
- Data storage based on blockchain architecture for Internet of Things (IoT)
- Shahar yo’llari va ko’chalarida joylashgan avtobus bekatlarining transport oqimi va harakat xavfsizligiga ta’sirini o’rganish
- Surgil konidagi 43-quduqdan olingan kondensatning fizikkimyoviy xossalarini o’rganish
Last modified: 2022-12-08 01:57:58