International Congress on Multidisciplinary Studies in Education and Applied Sciences
Berlin, Germany
June 3
rd
2022 conferencezone.org
241
INFORMATION SECURITY ISSUES
N.M.Mallaboyev
Namangan Engineering Construction
Institute
Republic of Uzbekistan, Namanagan city, 12 Islam
Karimov street
Qozaqova Munojat Sharifjanovna
Namangan Engineering Construction Institute
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street
Qosimov Muxammadjon
Student, Namangan Engineering Construction Institute
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street
Chimberdiyev Shukurullo
Student, Namangan Engineering Construction Institute
Republic of Uzbekistan, Namanagan city, 12 Islam Karimov street
The advent of Internet technology has increased the ability to
access information from a
variety of sources quickly and easily to an unprecedented extent for everyone - from ordinary
citizens to large organizations. Government agencies, science and education institutions,
commercial enterprises and individuals have begun to create and store information in
electronic form. This environment offers great convenience compared
to previous physical
storage: storage is very compact, transmission takes place instantly, and the possibilities of
accessing rich databases over the network are very wide. Opportunities
for efficient use of
information have led to a rapid increase in the amount of information. Business in a number
of commercial areas today considers information to be its most valuable asset. This is
definitely a very positive development when it comes to the media and information that
everyone can know. But Internet technologies have created new challenges for convenience
and confidential information flows, as well as convenience. The threat to information security
in the Internet environment has increased dramatically. According to a 1999 survey by the
U.S. Institute of Computer Security
and the FBI on computer crime, 57 percent of
organizations surveyed said their Internet connection was "a place where most attacks occur,"
and 30 percent said it was. and 26 percent reported that secret information was stolen during
the attack. According to the U.S. Federal Center for Computer Crime - FedCIRC, in 1998,
nearly 130,000 government networks with 1,100,000 computers were compromised.
"Computer hacking" refers to the launch of a special program by people to gain unauthorized
access to a computer. Forms of organizing such aggression are different. They are divided
into
the following types
Remote access to a computer: Programs that allow you to access the Internet or intranet
anonymously. Access to the computer on which it operates: based on access programs to the
computer without identification. Disabling the computer remotely: Based on programs that
connect to the computer remotely via the Internet (or network) and stop it or some of its
programs (it is enough to restart the computer to start). Disabling the computer on which it is
running: through disabling software. Network Scanners: In order
to determine which of the
computers and programs running on the network are vulnerable to intrusion, the network is
actually through data-gathering software. Finding vulnerabilities in software: Through
programs that search for vulnerabilities among large groups of computers on the Internet.
Unlock password: by means of programs that search for passwords that can be easily found in