Implementing a Cyber Security Insurance System
dc.creator | Mavlonov, O.N. | |
dc.creator | Melikuziev, R.Sh. | |
dc.creator | Radjabova, M.Sh. | |
dc.date | 2023-03-19 | |
dc.date.accessioned | 2023-08-20T07:09:59Z | |
dc.date.available | 2023-08-20T07:09:59Z | |
dc.description | This article is about a practical and effective cybersecurity insurance system. In ensuring cybersecurity, the insurance system was considered the main obstacle to the certification of information objects. Insurance is also a guarantee of information security. This article also provides information about some of the cyber threats, namely cyber terrorism, cyber warfare, cyber espionage, and cyber criminals. Information is provided on the statistics of countries where cyber attacks were carried out. Measures to prevent cyber attacks will be shown. This article provides the legal framework for cybersecurity prevention. | en-US |
dc.description | Mazkur maqolada kiberxavfsizlikni ta’minlashda amaliy va samarali natija beruvchi sugʻurtalash tizimi toʻgʻrisida tadqiqotlar olib borilgan. Kiber xavfsizlikni ta’minlashda sugʻurtalash tizimi axborot obyektlarini attestatsiyalashni amalga oshirishning asosiy yoʻnalishi boʻlib, sugʻurtalash axborot xavfsizlikning garovi hisoblanadi. Shuningdek mazkur maqolada kiber tahdidlarning ba’zilari yani kiberterrorizm, kiber urush, kiber josuslik va kiber jinoyatchilar toʻgʻrisida hamda kiber hujumlar qilingan mamlakatlar statistikasi haqida ma’lumotlar beriladi. Kiber hujumlarni oldini olish choralari koʻrsatib oʻtiladi hamda ushbu maqolada kiber xavfsizlikni oldini olishning huquqiy asoslari koʻrsatib oʻtilgan. | ru-RU |
dc.format | application/pdf | |
dc.identifier | https://ijdt.uz/index.php/ijdt/article/view/70 | |
dc.identifier.uri | http://dspace.umsida.ac.id/handle/123456789/6829 | |
dc.language | rus | |
dc.publisher | Samarkand branch of TUIT | en-US |
dc.relation | https://ijdt.uz/index.php/ijdt/article/view/70/50 | |
dc.rights | Copyright (c) 2023 O.N.Mavlonov | en-US |
dc.source | INTERNATIONAL JOURNAL OF THEORETICAL AND APPLIED ISSUES OF DIGITAL TECHNOLOGIES; Vol. 3 No. 1 (2023): International Journal of Theoretical and Applied Issues of Digital Technologies; 127-134 | en-US |
dc.source | Международный Журнал Теоретических и Прикладных Вопросов Цифровых Технологий; Том 3 № 1 (2023): Международный журнал теоретических и прикладных вопросов цифровых технологий; 127-134 | ru-RU |
dc.source | 2181-3094 | |
dc.source | 2181-3086 | |
dc.subject | Cyber security | en-US |
dc.subject | information object | en-US |
dc.subject | insurance | en-US |
dc.subject | attack | en-US |
dc.subject | cyber terrorism | en-US |
dc.subject | cyber security threat | en-US |
dc.subject | cyber war | en-US |
dc.subject | cyber espionage | en-US |
dc.subject | cyber crime | en-US |
dc.subject | Kiberxavfsizlik | ru-RU |
dc.subject | axborot obyekti | ru-RU |
dc.subject | sugʻurtalash | ru-RU |
dc.subject | hujum | ru-RU |
dc.subject | tahdid | ru-RU |
dc.subject | kiberterrorizm | ru-RU |
dc.subject | kiber urush | ru-RU |
dc.subject | kiber josuslik | ru-RU |
dc.subject | kiber jinoyatchilik | ru-RU |
dc.title | Implementing a Cyber Security Insurance System | en-US |
dc.title | Kiberxavfsizlikni ta’minlashda sugʻurtalash tizimini joriy etish | ru-RU |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion | |
dc.type | Peer-reviewed Article | en-US |