THREATS AND PROTECTION METHODS IN CYBERSECURITY
Abstract
This article analyzes the main threats in the field of cybersecurity and modern methods of their prevention. In addition, effective mechanisms for protecting information systems and computer networks are considered.
Keywords
cybersecurity, malware, phishing, encryption, firewall, authentication.
References
- President of the Republic of Uzbekistan. (2020). Decree No. PF–6079: Digital Uzbekistan – 2030 Strategy. Tashkent, Collection of Legislative Acts of the Republic of Uzbekistan.
- President of the Republic of Uzbekistan. (2021). Resolution No. PQ–5053: Measures to Ensure Information Security. Tashkent, Collection of Legislative Acts of the Republic of Uzbekistan.
- Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson Education.
- Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach. Pearson.
- Xaydarov, K. S., & A. H. R. Qizi. (2024). Configuration of Cisco Router and Verification of Its Operation Process. Mechanics and Technology, 4(17), 260–263.
- International Organization for Standardization. (2022). ISO/IEC 27001:2022 Information Security Management Systems (ISMS). Geneva, Switzerland.
- Xaydarov, K. S. (2025). Capabilities of Cisco Packet Tracer Software in Ensuring Modern Network Security. Economics and Society, (1–2 (128)), 509–512.
- Zoidova, O., Inamova, G., & Imamnazarov, E. (2025). THE ADVANTAGES OF USING DIGITAL TECHNOLOGY TOOLS IN TEACHING DIGITAL CIRCUITRY. Journal of Applied Science and Social Science, 1(3), 475-478.
Downloads
Download data is not yet available.