Articles | Open Access |

ENSURING COMPUTER DATA AND MANAGEMENT SYSTEM SECURITY

Yeshmuratova Amangul Artikbayevna , Assistant teacher at Nukus Mining Institute
Amanbaev Nursultan Salamat o‘g‘li , Student of Nukus Mining Institute
O‘telbayev Azizbek Alisher o‘g‘li , Student of Nukus Mining Institute

Abstract

Intrusion and data management detection systems, firewalls and other security devices ensure the secure operation of the network. In a computer system but with the widespread use of the network, viruses, hackers and other security incidents are increasing, which are security devices sends out tens of thousands of alerts in a very short period of time, network management staff are hard to find useful this is based on data from big signals. In addition, the ever-expanding network, mobile network, data management, Information related to SMS, MMS messaging service system, unified security device cannot detect all attacks, so we need to think about how and we need to create a secure system for these devices to work together.

Keywords

Security technologies such as computer virus prevention, security protocol, encryption, digital signature, firewall, network data transmission for security management, security auditing, illegal theft, tampering, counterfeiting.

References

Nuraliev F., Safarov S., Artikbayev M. Solving the problem of geometrical nonlinear deformation of electro-magnetic thin plate with complex configuration and analysis of results //2021 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2021. – С. 01-05.

Nuraliev F. M., Aytmuratov B. S., Artikbayev M. A. Solving the vibration of magnetic elastic plates with sophisticated form //2019 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2019. – С. 1-4.

Nuraliev F., Safarov S., Artikbayev M. A computational algorithm for calculating the effect of the electromagnetic fields to thin complex configured plates //2020 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2020. – С. 1-4.

Eshmuratova A. A. MATCAD DASTURIDAN FOYDALANIB IKKI VA UCH OLCHOVLI GRAFIKLARNI QURISH //Journal of Integrated Education and Research. – 2022. – Т. 1. – №. 5. – С. 534-539.

Artikbayevna Y. A. et al. MINE BLASTING PROCESSES OPTIMIZATION STAGES OF DIGITAL TECHNOLOGY OF DETONATORS. – 2023.

М. Aripov, A. Tillaev. Web sahifalar yaratish texnologiyalari. — Т., 2006-y. 170 b.

M. Aripov va boshqalar. A xborot texnologiyalari. — Т., 2009-y. 368 b.

U.Sh. Begimqulov, M .E. M am arajabov, S. Tursunov. FLA Sh M X dasturi va undan ta ’lim da foydalanish im koniyatlari. — Т., TD PU . 2006-y.

S.S.G ‘ulomov va boshqalar. Axborot tizim lari va texnologiyalari: Oliy o'quv yurti talabalari uchun darslik / A kadem ik S.S. G 'ulom ovning um um iy tahriri ostida. — Т., «Sharq», 2000. 529 b.

А гапонов C.B. и др. С редства дистанционного обучения. — БХВ Петербург, 2003. 336 с.

Компютерны е сети. У ебный курс: Официальное пособие Мисрософт для самостоятельной подготовки. Пер. С. А нгл. -2 изд., — М., «Русская редакция», 1999. 568 б.

Нейпевода Н.Н. С тили и методы програм мирования. Л екции, 2004 г. — М., Ижевск: И нститут ком пю терны х исследований. 2004 г. 328 с.

Н ейпевода Н .Н ., С коп ли н И .Н . О снование п рограм м ирования. — М., И жевск: И нститут ком пю терны х исследований. 2003 г. 864 с.

И ванова Г.С. О бектное ориентированное програм м ирование. Учебник. - МГТУ. 2003 г. 320 с.

Ш ики н Э.В., Боресков А.В. Компютернаяграф ика(динамика реалистическая изображ ение), — М., 1996 г. 288 с.

Kaipbergenov A. T., Utemisov A. O., Yuldashova H. B. K. STEADY OF AUTOMATIC CONTROL SISTEMS //Academic research in educational sciences. – 2022. – Т. 3. – №. 6. – С. 918-921.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

ENSURING COMPUTER DATA AND MANAGEMENT SYSTEM SECURITY. (2023). International Bulletin of Applied Science and Technology, 3(4), 282-287. https://researchcitations.com/index.php/ibast/article/view/1023