KOMPYUTER TARMOQLARIDA RAZVEDKA HUJUMLARI
Keywords:
Kalit so’zlar: Kompyuter tarmoqlari, razvedka hujumi, tarmoq xavfsizligi, axborot xavfsizligi, kiberxavfsizlik, himoya choralarAbstract
Ushbu maqolada kompyuter tarmoqlarida razvedka hujumlarining mohiyati, turlari va ularga qarshi kurashish usullari yoritiladi. Razvedka hujumlari axborotni o'g'irlash yoki tarmoq tizimlarining zaifliklarini aniqlash maqsadida amalga oshiriladi. Ushbu maqolada razvedka hujumlarining turli texnikalari, ularning zararli ta'siri va himoya choralariga oid batafsil tahlillar keltirilgan.
References
Stallings, W. (2017). "Network Security Essentials: Applications and Standards". Pearson.
Scarfone, K., & Mell, P. (2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". NIST.
Easttom, C. (2016). "Network Defense and Countermeasures: Principles and Practices". Pearson IT Certification.
Conklin, W. A., White, G. B., Williams, D., Davis, R., & Cothren, C. (2016). "Principles of Computer Security: CompTIA Security+ and Beyond". McGraw-Hill Education.
Tittel, E., & Lindros, G. (2019). "Computer Networking First-Step". Cisco Press.