MODELING OF THE METHOD OF ESTIMATION AND ANALYSIS OF PROTECTION OF INFORMATION RESOURCES IN DISTRIBUTED SYSTEMS |
Автор: Botirov.X.N.,Yusupaliyev B.I.,Qodirov F.E. |
14.04.2018 12:59 |
MODELING OF THE METHOD OF ESTIMATION AND ANALYSIS OF PROTECTION OF
INFORMATION RESOURCES IN DISTRIBUTED SYSTEMS Botirov.X.N assistant B.I.Yusupaliyev a student F.E.Qodirov a
student Karshi branch of TUIT named after Muhammad Al-Khorezmi Key words: information security, threat, threat assessment, distributed system,
linear encryption, algorithm. Modern methods of
processing, transmission and accumulation of information contributed to the
emergence of threats associated with the possibility of loss, distortion and
disclosure of data. Therefore, ensuring information security is one of the
leading directions in the development of information technology. There are the
following prerequisites, or the causes of threats: - objective (quantitative or
qualitative insufficiency of the elements of the system) - not directly related
to people's activities and causing random by nature of the threat; - subjective - directly
related to human activities and causing as intentional (the activity of
intelligence services of foreign countries, industrial espionage, the
activities of criminal elements and unfair employees), and unintentional (poor
psychophysiological state, insufficient training, low level of knowledge)
threats to information. Implementation of threats to
information security can be done: ... Полный текст во вложении |