MA’LUMOTLAR XAVFSIZLIGI VA SHIFRLASH TEXNOLOGIYALARI: MA’LUMOTLAR BAZALARIGA NOQONUNIY KIRISH USULLARI VA ULARNING OLDINI OLISH

##plugins.themes.bootstrap3.article.main##

Abstrak:

Mazkur ilmiy maqolada axborot jamiyati sharoitida ma’lumotlar xavfsizligini ta’minlashning nazariy va amaliy jihatlari, xususan, ma’lumotlar bazalarini himoyalash masalalari atroflicha tahlil qilinadi. Tadqiqot davomida kriptografik himoya usullari, shifrlash algoritmlarining ishlash tamoyillari hamda kiberjinoyatchilar tomonidan qo‘llaniladigan ma’lumotlar bazalariga noqonuniy kirish texnologiyalari ilmiy nuqtayi nazardan yoritib beriladi. Shuningdek, zamonaviy axborot tizimlarida xavfsizlikni mustahkamlash bo‘yicha samarali mexanizmlar va profilaktik choralar asoslab berilgan.

##plugins.themes.bootstrap3.article.details##

##submission.citations##:

Stallings W. Cryptography and Network Security: Principles and Practice. – Pearson Education, 2022.

Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. – John Wiley & Sons, 2015.

Bishop M. Computer Security: Art and Science. – Addison-Wesley, 2019.

Kahn Academy. Information Security Fundamentals. – Online resource.

ISO/IEC 27001:2022. Information Security Management Systems — Requirements.

Dilshodov, A., & Xayitboev, E. (2023). 5G tarmog’ida dasturiy ta’minot aniqlangan tarmoq (SDN) va OPENFLOW protokoli. Eng. Probl. Innov, 75-76.

Karimjonov , S., Odiljonov , O., & Dilshodov , A. (2025). MA’LUMOTLAR BAZASIDAN FOYDALANISHDA KENG TARQALGAN XATOLAR VA ULARNI BARTARAF ETISH. Universal Xalqaro Ilmiy Jurnal, 2(12), 290–293. Retrieved from https://universaljurnal.uz/index.php/jurnal/article/view/3845

Dilshodov, A. D. Main stages and features of the development of multimedia lectures in physics. Physics in the system of modern education (FSSO-15), 217-219.

Jaxongir o'g'li K. S. SUN’IY INTELLEKT ASOSIDA YARATILGAN ROBOTLARNING JAMIYATDAGI O ‘RNI //" ILM FAN IFTIXORI". – 2025. – Т. 1. – №. 1.