Ўзбекистон республикаси ахборот технологиялари ва коммуникацияларини ривожлантириш вазирлиги муҳаммад ал-хоразмий номидаги



Download 7,61 Mb.
Pdf ko'rish
bet260/321
Sana10.07.2022
Hajmi7,61 Mb.
#768599
1   ...   256   257   258   259   260   261   262   263   ...   321
Bog'liq
591c3149ad5ef

Radio electronic:
to stop the flow of information which is going through wire, to damage 
the management system and communication links with a radio electronic interference.
Components of information security: 


388 
1.
Security state of information environment, in this state it is being formed and 
develops for good of society and citizens
2.
In the state of information infrastructure security information is used precisely for 
the right purpose and while being used it does not affect the system negatively. 
3.
State of information being secure itself, in this state it is very difficult or impossible 
for its properties such as secretiveness, integrality, convenience to be destroyed. 
The number of ICT crimes has been growing progressively in the last decade compared 
to other types of crimes. 
Firstly
, ICT crime brings maximum profit with a minimum cost to ICT thieves.
Secondly
, organized crime groups are showing more interest to secret information of 
government and business systems to provide safety for themselves. 
Thirdly
, ICT crimes are related to many socio-legal factors in a global level. In light of 
globalization, IT sphere is not only becoming a place for international partnership, but also it is 
becoming a place for counter-strike and movements. 
The issue of information security can be seen in political, conference agendas more often, 
and drawing more and more attention of international organizations. The General Assembly of 
United Nations accepted the resolution A/KE8/54/49 on December 23, 1999. This resolution 
oversees the fact that modern information technologies can be used not only for development and 
security purposes, but also for negative purposes. 
Therefore, the information security should be considered as the entire social 
existence of human being, and the information security concept should be attached to the human 
rights concept. Because, the modern concept of human rights and freedom reject the all kind of 
hurts and harms which can be done by society or others to people.

Download 7,61 Mb.

Do'stlaringiz bilan baham:
1   ...   256   257   258   259   260   261   262   263   ...   321




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish