AXBOROT XAVFSIZLIGI TALABLARI BO‘YICHA AXBOROTLASHTIRISH OBYEKTLARINI ATTESTATSIYASI

Authors

  • M.Sh Ramazonova Toshkent axborot texnologiyalari unversiteti
  • M.E Narzullayev Toshkent axborot texnologiyalari unversiteti
  • J.B Shobo‘tayev Toshkent axborot texnologiyalari unversiteti
  • I.Sh Madatov Toshkent axborot texnologiyalari unversiteti

Keywords:

Axborotlashtirish ob’yekti attestatsiyasi, attestatsiyalash, muvofiqlik talablari, kadrlar tayyorlash, kadrlash tayyorlash darajasi.

Abstract

Ushbu maqolada axboroni himoya qilish vositalari va ushbu vositalarni attestatsiyadan o‘tkazish jarayonlari o‘rganilgan va axborot xavfsizligi talablari ko‘rib chiqilgan holatda talablar bo‘yicha axborotlashtirish abyektlarini attestatsiyasi o‘rganilgan.

References

Whitman, Michael E., and Herbert J. Mattord. "Principles of Information Security." Cengage Learning, 2018.

Pfleeger, Charles P., and Shari Lawrence Pfleeger. "Security in Computing." Pearson Education, 2015.

Whitman, Michael E., et al. "Management of Information Security." Cengage Learning, 2018.

Scarfone, Karen, and Murugiah Souppaya. "Guide to Computer Security Certification and Accreditation." CRC Press, 2006.

NIST Special Publication 800-37 Revision 2: "Risk Management Framework for Information Systems and Organizations." National Institute of Standards and Technology, 2018.

Anderson, James A., and Peter D. Nash. "Security Engineering: A Guide to Building Dependable Distributed Systems." Wiley, 2008.

NIST Special Publication 800-53 Revision 5: "Security and Privacy Controls for Information Systems and Organizations." National Institute of Standards and Technology, 2020.

Carroll, John M., et al. "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies." McGraw-Hill, 2014.

National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 11: "National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology Products." Committee on National Security Systems, 2010.

Chapple, Mike, et al. "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide." Sybex, 2018.

National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 6: "National Policy for Telecommunications and Automated Information Systems Security." Committee on National Security Systems, 2003.

Schou, Corey, and Steven Hernandez. "Information Assurance for the Enterprise: A Roadmap to Information Security." McGraw-Hill, 2007.

National Institute of Standards and Technology. "Security Standards for Federal Information Systems and Organizations." National Institute of Standards and Technology, various editions.

Downloads

Published

2024-04-28

How to Cite

Ramazonova , M., Narzullayev , M., Shobo‘tayev , J., & Madatov , I. (2024). AXBOROT XAVFSIZLIGI TALABLARI BO‘YICHA AXBOROTLASHTIRISH OBYEKTLARINI ATTESTATSIYASI. Educational Research in Universal Sciences, 3(5), 18–23. Retrieved from http://erus.uz/index.php/er/article/view/6247