BULUTLI TEXNOLOGIYALAR ASOSIDA KORPORATIV MA’LUMOTLAR XAVFSIZLIGINI TA’MINLASH USULLARI
PDF

Keywords

bulutli texnologiyalar, korporativ ma’lumotlar, axborot xavfsizligi, shifrlash, autentifikatsiya, zaxira nusxasi, tahdidlar, kirishni boshqarish, raqamli transformatsiya, ma’lumotlar xavfsizligi siyosati.

Abstract

Mazkur tezisda zamonaviy axborot-kommunikatsiya infratuzilmasining ajralmas qismi sifatida shakllanayotgan bulutli texnologiyalar asosida korporativ ma’lumotlar xavfsizligini ta’minlash masalalari yoritilgan. Xususan, bulutli muhitda saqlanayotgan ma’lumotlarga tahdid soluvchi omillar, ularning turlari va ularni aniqlash mexanizmlari ko‘rib chiqiladi. Korxonalar uchun ma’lumotlar maxfiyligini, butligini va mavjudligini kafolatlaydigan xavfsizlik texnologiyalari – shifrlash, ko‘p faktorli autentifikatsiya, kirishni boshqarish siyosatlari, zaxira nusxalash va xavflarni monitoring qilish tizimlari tahlil qilinadi. Shuningdek, milliy va xalqaro axborot xavfsizligi standartlariga muvofiqlik, bulutli xizmat provayderlarining roli hamda O‘zbekistondagi raqamli transformatsiya jarayonlarida bu texnologiyalarning qo‘llanishi amaliy misollar bilan yoritilgan.

PDF

References

1. O‘zbekiston Respublikasi Prezidentining 2020-yil 5-oktabrdagi “Raqamli O‘zbekiston – 2030” strategiyasini tasdiqlash to‘g‘risidagi PQ–6079-son Qarori: https://lex.uz/ru/docs/-5030957

2. ISO/IEC 27001:2013 – Information security management systems – Requirements. International Organization for Standardization, Geneva, 2013.

3. National Institute of Standards and Technology (NIST). Special Publication 800-53 Rev. 5 – Security and Privacy Controls for Information Systems and Organizations. U.S. Department of Commerce, 2020.

4. European Union. General Data Protection Regulation (GDPR). – Regulation (EU) 2016/679 of the European Parliament and of the Council. – Brussels, 2016.

5. Stallings W. Network Security Essentials: Applications and Standards. – 6th ed. – Pearson Education, 2020.

6. Kaufman C., Perlman R., Speciner M. Network Security: Private Communication in a Public World. – 2nd ed. – Prentice Hall, 2016.

7. Хаитов М., Юсупов И. Axborot xavfsizligi asoslari. – Toshkent: “Fan va texnologiya”, 2021. – 260 b.

8. Karimov A., Zokirov S. Bulutli texnologiyalar va ularning amaliy qo‘llanilishi. – Toshkent: TDYU nashriyoti, 2022. – 144 b.

9. Rashid A. Cloud Computing: Concepts, Technology & Architecture. – Prentice Hall, 2013.

10. Li, J., Chen, X., Zhang, Q. et al. Secure and Privacy-Preserving Data Storage in Cloud Computing: A Survey. – IEEE Access, 2020. – Vol. 8. – pp. 1310–1332.

11. Wang, C., Wang, Q., Ren, K., Lou, W. Ensuring Data Storage Security in Cloud Computing. – Proceedings of the 17th International Workshop on Quality of Service (IWQoS). – 2009.