z-logo
open-access-imgOpen Access
ON ENSURING INFORMATION SECURITY FOR INSTITUTIONS OF HIGHER EDUCATION
Author(s) -
Хikmatilla Nigmatov,
Alisher Muhammadiyev
Publication year - 2020
Publication title -
the light of islam
Language(s) - English
Resource type - Journals
eISSN - 2181-1091
pISSN - 2181-9939
DOI - 10.47980/tloi/2020/4/13
Subject(s) - computer science , process (computing) , information security , computer security , information security management , point (geometry) , information system , work (physics) , information security standards , population , security information and event management , knowledge management , security service , cloud computing security , network security policy , engineering , political science , law , cloud computing , mechanical engineering , geometry , mathematics , demography , sociology , operating system
This article is devoted to one of the most relevant and demanded topics ­ information security. One of the reasons for this is that because of the pandemic, the world’s population has switched to a digital management system through computer networks. As a result, the main part of the system of higher, secondary, and special education switched to the forms of distance learning. In this article, we tried to answer, based on scientifc research, the questions related to what standards and safeguards should be used to ensure the security of data in computer systems and networks of higher education institutions. At present, all educational institutions have their computer systems and networks, perform all the necessary calculations and organizational work, and also carry out the educational process based on computers. We focused on the issues of ensuring their security in the process of transmitting or receiving data through the switching networks available on these computers. The article analyzes the issues of information security in local networks of information systems, based on the systematization of information from the point of view of information security, information security system, and optimal data management. By analyzing how data transmitted over communication channels of computer networks are delivered with errors and delays, we get an idea of what parameters and characteristics should be used as the main criterion. It has been proved that in computer systems and networks used in higher educational institutions and research institutes, it is necessary to pay great attention to the protection of information, to widely use organizational, technical, legal, cryptographic tools to eliminate risks and attacks. As the main criterion, taking into account the technical and economic parameters of information protection, it is proposed to take into account confdentiality, the need for each information, and its value. This article is intended for those who research the feld of information security management in computer systems and networks

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here