часть
1
«
Научный импульс
»
Мая
, 2023
72
kommunikatsiya protokollari, integatsiya va yo'qotish, dasturiy ta'minot, boshqaruv va
monitoring, tashqi aloqalar va integratsiya, sifat va iste'molchilar odatlari kabi muhim
tushunchalar va amaliyotlar keng qo'llaniladi.
XULOSA Biometrik identifikatsiya va autentifikatsiya tizimlari, foydalanuvchilar uchun yuqori
darajada xavfsiz va ishonchli bir identifikatsiya va autentifikatsiya usuli ko'rsatishda katta
potentsialga ega. Ular shaxsiy ma'lumotlarni himoya qilishda, parollar yoki kartalar kabi
kimlik tekshiruv usullaridan farqli ravishda foydalanishlariga asoslangan. Bu usullar
foydalanuvchining biometrik ma'lumotlarini, masalan, yuz, parmak izi, ovoz yoki retina
skanerlari yordamida o'qishni va ulardan unikal identifikatorlar yaratishni o'z ichiga oladi.
FOYDALANILAGAN ADABIYOTLAR: Axborot xavfsizligi tizimini qurish metodologiyasi va xavf-xatarlarni tahlil qilish va
boshqarish sohasida foydalaniladigan bazilar adabiyotlar:
Rossouw, R., & von Solms, R. (2016). Information Security Governance: A Practical
Development and Implementation Approach. Auerbach Publications.
Whitman, M. E., & Mattord, H. J. (2016). Principles of Information Security. Cengage
Learning.
Pfleeger, C. P., & Pfleeger, S. L. (2018). Security in Computing. Pearson.
Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk Management Guide for
Information Technology Systems. National Institute of Standards and Technology (NIST)
Special Publication.
ISO/IEC 27001:2013. Information technology — Security techniques — Information
security management systems — Requirements.
ISO/IEC 27002:2013. Information technology — Security techniques — Code of
practice for information security controls.
NIST Special Publication 800-53. Security and Privacy Controls for Federal Information
Systems and Organizations.
Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in
C. John Wiley & Sons.
Anderson, R. (2008). Security Engineering: A Guide to Building Dependable
Distributed Systems. Wiley.
«Axborot texnologiyasi. Ma’lumotlami kriptografik muho- fazasi. Elektron raqamli
imzoni shakllantirish va tekshirish jarayonlari» O‘zbekiston Davlat standard. 0‘z DSt
1092:2005.
«Axborot texnologiyasi. Axborotlami kriptografik muhofazasi. Ma’lumotlami shifrlash
algoritmi» 0‘zbekiston Davlat standard. 0‘zDSt 1105:2006