•  
  •  
 

The Light of Islam

Abstract

This article is devoted to one of the most relevant and demanded topics ­ information security. One of the reasons for this is that because of the pandemic, the world’s population has switched to a digital management system through computer networks. As a result, the main part of the system of higher, secondary, and special education switched to the forms of distance learning. In this article, we tried to answer, based on scientifc research, the questions related to what standards and safeguards should be used to ensure the security of data in computer systems and networks of higher education institutions. At present, all educational institutions have their computer systems and networks, perform all the necessary calculations and organizational work, and also carry out the educational process based on computers. We focused on the issues of ensuring their security in the process of transmitting or receiving data through the switching networks available on these computers. The article analyzes the issues of information security in local networks of information systems, based on the systematization of information from the point of view of information security, information security system, and optimal data management. By analyzing how data transmitted over communication channels of computer networks are delivered with errors and delays, we get an idea of what parameters and characteristics should be used as the main criterion. It has been proved that in computer systems and networks used in higher educational institutions and research institutes, it is necessary to pay great attention to the protection of information, to widely use organizational, technical, legal, cryptographic tools to eliminate risks and attacks. As the main criterion, taking into account the technical and economic parameters of information protection, it is proposed to take into account confdentiality, the need for each information, and its value. This article is intended for those who research the feld of information security management in computer systems and networks

First Page

167

Last Page

174

References

  1. Nigmatov H, Tursunov N. . (2018). Axborot xavfsizligi. Toshkent: Toshkent islom universiteti nashriyot-matbaa birlashmasi.
  2. Nigmatov X, Umarov A. (2020). Monografiya. . Zamonaviy axborot-kommunikatsiya texnologiyalarining aloqa kanallarida axborotlarni himoyalash. Toshkent: inovatsiyon rivojlanish nashriyo-matbaa uyi.
  3. Nigmatov, H. (1993). Opredelenie osnovnih kachestvennih pokazateley kompyuternih setey s raznotipnimi kanalami svyazi i izmenyaushiysya strukturoy. Toshkent.
  4. Nigmatov, H. (1996). Modeli i algoritmi upravleniya setyu peredachi dannix s raznotipnimi kanalami svyazi i izmenyaushiysya strukturoy. Toshkent.
  5. Nigmatov, H. (2004). Yangi axborot tehnologiyalari fanidan ta’lim berishni takomillashtirish to’g’risida. Toshkent.
  6. Bragg, R. (2001). Sistema bezopasnosti Windows 2000. Moskva: Vilyams.
  7. Gaykovich V., Lershin A. (1993). Bezopasnost elektronnix bankovskix sistem. Moskva.
  8. Gerasimenko V.A., Malyuk A.A. (1997). Osnovi zashiti informatsii. Moskva.
  9. Gerasimenko, V. (1994). Zashita informatsii v avtomatizirovannix sistemax obrabotki dannix. Moskva.
  10. Grinyayev, S. (1999). Intellektualnoye protivodeystviye informatsionnomu orujiyu. Seriya Informatizatsiya Rossii na poroge XXI veka. Moskva: SINTЕG.
  11. Dolotov, V. D. Vremya texnologiy xDSL / V .D. Dolotov // Texnologii i sredstva svyazi. – 2003. – № 1. – S. 36–38. . (200).
  12. Zavgorodniy, V. ( 2001). Kompleksnaya zashita informatsii v kompyuternix sistemax: Uchebnoye posobiye dlya vuzov. M. Logos.
  13. Zegjda D.P., Ivashko A.M. . (b.d.). Kak postroit zashishennuyu informatsionnuyu sistemu . Mir i semya.
  14. Zima V.M., Moldovyan A.A., Moldovyan N.A. (2001). Bezopasnost globalnix setevix texnologiy. Peterburg.
  15. Kaplan A., Nilsen M.Sh. (2000). Windows 2000 iznutri. Moskva.
  16. Kulakov, B. (2005). Informatsionnaya bezopasnost telekommunikatsionnix sistem. Moskva.
  17. Leonova, A. (2000). Kompyuternaya prestupnost i informatsionnaya bezopasnost. ARIL.
  18. Nevdyayev, L. (2000). Mobilnaya svyaz 3-go pokoleniya. Seriya izdaniy Svyaz i biznes. Moskva.
  19. Nigmatov, X. (2003). Vvedeniye v informatsionnuyu bezopasnost. Tashkent: TADI.
  20. Nigmatov, X. (2013 ). Informatsionnaya bezopasnost. Zashita informatsii v setyax telekommunikatsii. Shimkent .
  21. Nigmatov, X. (2013 ). Kompyuternie seti i sistemi v IP telefonii. Shimkent : JЕBЕ.
  22. Nigmatov, X. (2013 ). Sistemi i ustroystva sputnikovoy i mobilnoy radiosvyazi. Shimkent : JЕBЕ.
  23. Petrenko S.A., Petrenko A.A. . (2002). Audit bezopasnosti Intranet. Moskva.
  24. Ratinskiy, M. (2000). Osnovi sotovoy svyazi. /Pod redaksiyey Zimina D.B., - 2-ye izdaniye., pererab. i dopolnen. Radio i svyaz. Moskva.
  25. Sokolov A. V., Shengin V.F. . (2002). Zashita informatsii v raspredelyonnix korporativnix setyax i sistemax. Moskva : DMK – PRЕSS.
  26. Tanenbaum, E. (2003). Kompyuternie seti . Piter.
  27. Usmonov A, Odilova Z, Nig‘matov H. (1984). Upravleniye informasionnimi potokami ASU v setyax peredachi dannix. Toshkent: FAN nashr.
  28. Sherbakov, A. (2001). Vvedeniye v teoriyu i praktiku kompyuternoy bezopasnosti. Moskva: Mol-gacheva.

Share

COinS