Xavfsizlik atributi – baholanish obyektining xavfsizlik siyosatini amalga oshirishda ishlatiluvchi subyektlar, foydalanuvchilar va/yoki obyektlar bilan bog’lik axborot.
Xavfsizlik auditi – kompyuter tizimi xavfsizligiga ta’sir etuvchi bo’lishi mumkin bo’lgan xavfli harakatlarni xarakterlovchi, oldindan aniqlangan hodisalar to’plamini ro’yxatga olish (audit faylida qaydlash) yo’li bilan himoyalanishni nazoratlash.
Xavfsizlikxizmatima’muri – xavfsizlikni ta’minlashning bir yoki bir necha tizimi hamda loyihalashni nazoratlash va ulardan foydalanish xususida to’liq tasavvurga ega shaxs (yoki shaxslar guruhi).
Xavfsizlikniaktivtestlash– nishon bilan to’g’ridan – to’g’ri o’zaro aloqaga mo’ljallangan xavfsizlikni testlash, masalan, talab qilingan nishongacha paketni yuborish.
Xavfsizlikning avtomatlashtirilgan domeni -asboblar, texnologiyalar guruhini hamda ma’lumotlarni o’z ichiga olgan axborot xavfsizligi sohasi.
Xeshlashalgoritmi – kriptografiyada kriptografik xesh-funksiyani amalga oshiruvchi algoritm. Matematika va dasturlashda – odatda, satr uzunligini kamaytiruvchi simvollar satrini o’zgartiruvchi algoritm. Chiqish yo’li satrining har bir simvolining qiymati kirish yo’li simvollarining katta soniga (idealda – barchasiga) murakkab tarzda bog’liq. Odatda xeshlash algoritmi ixtiyoriy uzunlikdagi satrni belgilangan uzunlikdagi satrga o’zgartiradi.
Xodim xavfsizligi– qandaydir jiddiy axborotdan foydalanish imkoniyatiga ega barcha xodimlarning kerakli avtorizatsiyaga va barcha kerakli ruxsatnomalarga egalik kafolatini ta’minlovchi usul.
Yolg’on axborot – xarakteristikalari va alomatlari noto’g’ri akslantiriluvchi hamda real mavjud bo’lmagan obyekt xususidagi axborot.
Zombi - tizimda o’rnatilgan, boshqa tizimlarga hujum qilishga majbur qiluvchi dastur.
National Information Systems Security (InfoSec) Glossary (2000) National Security Telecommunications and Information Systems Security Committee. National Security Agency US.
Pfleeger, C.P. (1997) Security in Computing. Second Edition, Prentice Hall, Upper Saddle River.
Guttman, B. and Roback, E. (1995) An Introduction to Computer security: The NIST Handbook. DIANE Publishing. http://dx.doi.org/10.6028/NIST.SP.800-12
Stamp M. Information security: principles and practice // John Wiley & Sons, 2011, -P. – 606.
Purdy G. ISO 31000: 2009—setting a new standard for risk management //Risk Analysis: An International Journal. – 2010. – Т. 30. – №. 6. – С. 881-886.
ISACA C. S. X. Cybersecurity Fundamentals //Study Guide. – 2014.
Curricula C. Curriculum guidelines for post-secondary degree programs in cybersecurity. – 2017.
Акбаров Д.Е. Ахборот хавфсизлигини таъминлашнинг криптографик усуллари ва уларнинг қўлланилиши // Тошкент, 2008, -Б. - 394.
Ганиев С.К., Каримов М.М., Худойқулов З.Т., Кадиров М.М. Ахборот хавфсизлиги бўйича атама ва тушунчаларнинг рус, ўзбек ва инлиз тилларидаги изоҳли луғати // Тошкент 2017, -Б. - 480.
Ferguson N., Schneier B. Practical cryptography // New York: Wiley, 2003. – P. - 432.
Bruce S. Applied cryptography: protocols, algorithms, and source code in C //New York: Wiley. – 1996, - P. - 1027.
Smart N. P. et al. Cryptography: an introduction. – New York : McGraw-Hill, 2003. – Т. 3.
Шаньгин, В. Ф. Информационная безопасность компьютерных систем и сетей : учеб. пособие / В.Ф. Шаньгин. — Москва : ИД «ФОРУМ» : ИНФРА-М, 2017. — 416 с.
Хасанов П.Ф., Хасанов Х.П., Ахмедова О.П., Давлатов А.Б. “Криптотаҳлил ва унинг махсус усуллари” электрон ўқув қўлланма. 2010 й.
Акбаров Д.Е., Хасанов П.Ф., Хасанов Х.П., Ахмедова О.П. “Криптографиянинг математик асослари” электрон ўқув қўлланма. 2010 й.
Zlatanov, Nikola. (2015). Hard Disk Drive and Disk Encryption. 10.13140/RG.2.1.1228.9681.
Healy, Michael & Newe, Thomas & Lewis, Elfed. (2008). Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes. 10.1007/978-3-540-79590-2_1.
Scarfone K. et al. Guide to storage encryption technologies for end user devices //NIST Special Publication. – 2007. – Т. 800. – С. 111.
Chuvakin A., Williams B. R. PCI Compliance. – Syngress, 2011.
Shinder D. L., Cross M. Scene of the Cybercrime. – Elsevier, 2008.
Введение в информационную безопасность автоматизированных систем: учебное пособие / В. В. Бондарев. — Москва : Издательство МГТУ им. Н. Э. Баумана, 2016. — 250, с.
Regulations O., Guidance R. Code of Federal Regulations //Respiratory Protection. – 1910.
Frields J. National Industrial Security Program. Operating Manual Supplement. – DEPARTMENT OF DEFENSE WASHINGTON DC, 1995. – №. DOD-5220.22-M-SUP-1.
biometrics for cryptographic key generators // TUIT BULLETIN, Тashkent, 2016,
№4 (40), – P. 80-92.
Rathgeb C., Uhl A. A survey on biometric cryptosystems and cancelable biometrics //EURASIP Journal on Information Security, 2011, №1, – P. 1-25.
Report to Congress on Breaches of Unsecured Protected Health Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health and Human Services Office for Civil Rights. https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015-2016- 2017.pdf