Downloads provided by UsageCounts
{"references": ["1.\tWhitman, M. E., & Mattord, H. J. (2019). Principles of information security. Cengage Learning. 2.\tAnderson, R., & Moore, T. (2009). The economics of information security. Science, 314(5799), 610-613. 3.\tClarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. 4.\tSchneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. WW Norton & Company. 5.\tNIST Cybersecurity Framework. (2018). National Institute of Standards and Technology. 6.\tISO/IEC 27001:2013. Information technology - Security techniques - Information security management systems - Requirements. 7.\tEuropean Union Agency for Cybersecurity (ENISA). (2018). Cybersecurity Culture in Organizations. 8.\tD'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98. 9.\tLee, J., Lee, M., & Lee, I. (2014). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 57(4), 431-440. 10.\t Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-502."]}
Ushbu mavzu kompyuter tizimlari, tarmoqlar, dasturiy ta’minot va ma’lumotlar kabi axborot texnologiyalari (IT) aktivlarini kiber tahdidlardan himoya qilishni nazarda tutadi. Kiber tahdidlar turli shakllarda bo‘lishi mumkin, jumladan viruslar, zararli dasturlar, fishing hujumlari, to‘lov dasturi, ijtimoiy muhandislik va insayder tahdidlar. Kiberxavfsizlik ushbu tahdidlarning IT aktivlarining maxfiyligi, yaxlitligi va mavjudligini buzishining oldini olishga qaratilgan. Bu AT aktivlarini ruxsatsiz kirish, foydalanish, oshkor qilish, buzish, o‘zgartirish yoki yo‘q qilishdan himoya qilishni ta’minlash uchun bir qator amaliyotlar, texnologiyalar va siyosatlarni amalga oshirishni o‘z ichiga oladi. Samarali kiberxavfsizlik choralari jismoniy shaxslar, tashkilotlar va hukumatlar uchun kiberhujumlardan himoyalanish hamda maʼlumotlarning buzilishi, moliyaviy yoʻqotishlar va obroʻga putur yetkazish xavfini minimallashtirish uchun zarurdir.
Kiberxavfsizlik, himoya, tizimlar, tarmoqlar, maxfiy ma'lumotlar, ruxsatsiz kirish, foydalanish, oshkor qilish, buzish, o'zgartirish, yo'q qilish, kiber tahdidlar, viruslar, zararli dasturlar, fishing hujumlari, to'lov dasturi, ijtimoiy muhandislik, insayder tahdidlar, maxfiylik, yaxlitlik, mavjudlik, amaliyotlar, texnologiyalar, siyosatlar, ma'lumotlarning buzilishi, moliyaviy yo'qotishlar, obro'ga zarar.
Kiberxavfsizlik, himoya, tizimlar, tarmoqlar, maxfiy ma'lumotlar, ruxsatsiz kirish, foydalanish, oshkor qilish, buzish, o'zgartirish, yo'q qilish, kiber tahdidlar, viruslar, zararli dasturlar, fishing hujumlari, to'lov dasturi, ijtimoiy muhandislik, insayder tahdidlar, maxfiylik, yaxlitlik, mavjudlik, amaliyotlar, texnologiyalar, siyosatlar, ma'lumotlarning buzilishi, moliyaviy yo'qotishlar, obro'ga zarar.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 79 | |
| downloads | 32 |

Views provided by UsageCounts
Downloads provided by UsageCounts