248
Talabalar mustaqil ta’limining mazmuni va hajmi
T/r
Mavzulari
Muddati
Soati
1.
Tarmoq arxitekturasi va standartlashtirish.
Semestr davomida
45 soat
2.
Tarmoq skanerini tadqiq qilish.
3.
Tarmoq inventarizatsiyasida dasturiy ta’minotdan foydalanish.
4.
Keng polosali foydalanish texnologiyasi.
5.
Simsiz tarmoq arxitekturasi.
6
Tarmoqda axborot xavfsizligi muammolari va ularning
yechimlari
7.
Simsiz tarmoq infrastrukturasi.
8.
Tarmoq xavfsizligi standartlari
9.
Simsiz lokal tarmoq arxitekturasi va komponentlari.
Semestr davomida
45 soat
10.
WiMAX texnologiyasi.
11
Tarmoqdagi asosiy tahdidlar.
12.
Asosiy tarmoq hujumlari.
13.
Simsiz tarmoqlar xavfsizligi protokollari.
14.
Tarmoq identifikatsiyasi va autentifikatsiyasi protokollari.
15.
Simsiz tarmoq tarmoqdan foydalanuvchilarga bo‘ladigan
hujumlar
Jami
90
249
VII. GLOSSARY
Termin
O‘zbek tilidagi sharhi
Ingliz tilidagi sharhi
Abonent
hisoblash tizimi xizmatlaridan
foydalanish huquqiga ega shaxs
(shaxslar guruxi, tashkilot).
the person (group of persons,
organization) who has the right
to use the services of a
computer system.
AKT xavfsizlik
siyosati
Tashkilot va uning AKT doirasida
aktivlarni shu jumladan, kritik axborotni
boshqarish, himoyalash va taqsimlashni
belgilovchi qoidalar, ko‘rsatmalar,
amaliyot.
Rules, guidelines, practices that
govern the management,
protection and distribution of
critical information, including
assets within the organization
and its ICT.
Aktiv
Axborot xavfsizligida tashkilot uchun
qimmatbaho bo‘lgan va himoyalanishi
lozim bo‘lgan narsalar
Information security is
something that is valuable to an
organization and should be
protected
Apparat himoya
kompyuterda ma’lumotlarni
himoyalashda apparat vositalardan,
masalan, chegara registrlaridan yoki
qulflardan va kalitlardan foydalanish.
the use of hardware, for
example, registers boundaries
or locks and keys to protect data
in computers.
Autentifikatsiya
odatda tizim resurslaridan
foydalanishga ruxsat etish xususida
qaror qabul uchun foydalanuvchining
(haqiqiyligini), qurilmaning yoki
tizimning boshqa tashkil etuvchisining
identifikatsiyasini tekshirish;
saqlanuvchi va uzatuvchi
ma’lumotlarning ruxsatsiz
modifikatsiyalanganligini aniqlash
uchun tekshirish.
checking user authentication
(authentication), device, or
other component in the system,
usually to make a decision
about granting access to system
resources; checking the
integrity of stored or
transmitted data to detect
unauthorized modification.
Avtomatik nazorat
(o‘rnatilgan nazorat)
apparat vositalari yordamida avtomatik
bajariluvchi nazorat.
control performed automatically
by hardware.
Avtomatlashtirilgan
axborot tizimi
ma’lumotlarni va axborotni yaratish,
uzatish, ishlash, tarqatish, saqlash
va/yoki boshqarishga va hisoblashlarni
amalga oshirishga mo‘ljallangan
dasturiy va apparat vositalar.
a set of software and hardware
designed for the creation,
transmission, processing,
distribution, storage and/or data
and information management
and production calculations.
Avtorizatsiya
tizimda foydalanuvchiga, uning i
autentifikatsiyasiga asosan, ma’lum
foydalanish huquqlarini taqdim etish.
View user specific access rights
on the basis of a positive result
in its authentication system
Axborot
muayyan ob’ekt xususidagi
bilimlarimizning noaniqlik darajasini
pasaytirishga imkon beruvchi har
qanday ma’lumot.
data that reduces the uncertainty
degree of knowledge about
certain object.
Axborot sirqib
chiquvchi kanal
ko‘riklanuvchi ma’lumotlardan (tijorat
siri, fizik muhit va sanoat ayg‘oqchilik
vositalari majmui) ruxsatsiz
foydalanishga imkon beruvchi
actual path from a source of
confidential information to the
malefactor, on which probably
unauthorized obtaining
250
konfidensial axborot manbaidan to
niyati buzuqgacha bo‘lgan fizik yo‘l.
protected data (set of a source
of a trade secret, the physical
environment and means of
industrial espionage).
Axborot tarmog‘i
xavfsizligi
axborot tarmog‘ini ruxsatsiz
foydalanishdan, me’yoriy harakatiga
tasodifan aralashishdan yoki
komponentlarini buzishga urinishdan
saqlash choralari.
measures designed to protect
network information from
unauthorized access, accidental
or intentional interference with
normal activities or attempts to
destroy its components.
Axborotdan
noqonuniy
foydalanish
qonuniy yo‘l bilan olingan
ma’lumotlarni, ushbu ma’lumotlarga va
bunday harakatlarga qo‘l uruvchi
sub’ektlarga o‘rnatilgan qoidalarni va
vakolatlarni (sanksiyalarni) buzgan
holda, uzatish, tarqatish (chop etish) va
qo‘llash.
transmission,
distribution(publishing), the use
of informationobtainedthrough
legal meansinviolation of the
rulesand powers(sanctions)
established forthis
informationand subject,to take
such action.
Axborotdan
ruxsatsiz
foydalanish
manfaatdor sub’ektning huquqiy
hujjatlarni yoki mulkdor, axborot egasi
tomonidan o‘rnatilgan himoyalanuvchi
axborotdan foydalanish huquqlari yoki
qoidalarini buzib himoyalanuvchi
axborotga ega bo‘lishi.
preparation of protected
information interested entity in
violation of the legal
instruments or by the owner, the
owner of the information or
rights of access to protected
information.
axborotga ishlov
berish vositalari:
Axborotga ishlov berish bo‘yicha
istalgan tizimlar, servislar yoki
infratuzilmalar, shuningdek, ularning
fizik joyi.
Any information processing
systems, services, or
infrastructure, as well as their
physical location.
Axborotni fosh
qilinishdan
himoyalash
himoyalanuvchi axborotni, ushbu
axborotdan foydalanish xuquqiga ega
bo‘lmagan manfaatdor sub’ektlarga
(iste’molchilarga) ruxsatsiz yetkazishni
bartaraf etishga yo‘naltirilgan axborot
himoyasi.
the information security
directed on prevention of
unauthorized finishing of
protected information to
interested subjects (consumers),
not having right of access to
this information.
Axborotning
blokirovka qilinishi
axborotning texnik vositalar yordamida
ishlanishida uning foydalanuvchanlik
xususiyatining yo‘qolishi. Natijada
tanishish, xujjatlash, modifikatsiyalash
yoki yo‘q qilish bo‘yicha vakolatli
amallarni bajarish qiyinlashadi yoki
to‘xtatiladi.
the loss of information when it
is processed by technical means
accessibility property,
expressed in difficulty or
termination of authorized
access to it for authorized
operations familiarization,
documentation, modification, or
destruction.
Biometrik
autentifikatsiya –
abonentni (foydalanuvchini) uning
biometrik xarakteristikasi (barmoq
Authentication Method
subscriber (user), based on its
251
izlari, panja geometriyasi, yuzi, ovozi,
ko‘z pardasining turi va h.) asosidagi
autentifikatsiyalash usuli. Ushbu
usulning afzalligi – biometrik
xarakteristikalarni foydalanuvchidan
ajratib bo‘lmasligi. Ularni esdan
chiqarishning, yo‘qotishning yoki
boshqa foydalanuvchiga berishning iloji
yo‘k.
verification of biometrics
(fingerprints, hand geometry,
face, voice, retina pattern, etc.).
The advantages of this method
is the inseparability of the
biometric characteristics of the
user: they can not be forgotten,
lost or transferred to
Bir martali parollar
aosidagi
autentifikatsiya
bir martali parollar yordamida
autentifikatsiyalash texnologiyasi. Bir
martali parollarni olishda quydagilar
ishlatilishi mumkin: bir tomonlama
funksiya asosida generatsiyalash
algoritmi, maxsus qurilmalar-tokenlar,
yoki bir martali parolni, foydalanuvchi
tadbiqiy tizimdan foydalanishda
ishlatiladigan kanaldan farqli, kanal
orqali uzatishga asoslangan
OOV(outofband) texnologiyasi.
authentication technology based
on one time passwords, for
which can be used: the
generation algorithm based on
one-way function, a special
device - tokens or technology
OOB (out of band), based on
the transmission of single
password using an additional
channel different from that in
which the user accesses the
application system.
Bir taraflama
autentifikatsiya
taraflar autentifikatsiyasi bo‘lib,
taraflarning biri u bilan o‘zaro
harakatdagi tarafning haqiqatan ham
o‘zi ekanligini tekshiradi. Bir taraflama
autentifikatsiya ikkita ishtirokchi:
isbotlovchi va tekshiruvchi bilan
autentifikatsiyalash protokoli orqali
amalga oshiriladi.
authentication of the parties, in
which one of the parties to
check that it interacts with the
side - namely that for which he
is. Identification protocol is
implemented with two
Dostları ilə paylaş: |