Konferensiyasi



Yüklə 1,48 Mb.
Pdf görüntüsü
səhifə13/38
tarix23.07.2023
ölçüsü1,48 Mb.
#119845
1   ...   9   10   11   12   13   14   15   16   ...   38
63ed0704130b8 19 respublika ilmiy onlayn 10-TA

II.
 
METHODS 
The first step in overcoming this problem is to improve the skills of these consumers, 
the second is to improve work discipline and responsibility, and the third is to create a 
guidebook that is easy to use and understand in the work process. From time to time, it is 
advisable to hold question-and-answer sessions in the form of roundtables with good 
professionals for employees and consumers. 
The next weak point of information systems is the network, attacks on the system are 
mainly carried out through the network, because public networks are transparent and open 


“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
163 
to all users. It is not always possible to identify an external customer who accesses the 
system in the process of communicating over the network. This is because there are now 
thousands of opportunities to disguise themselves, so the chances of attacking systems are 
just as high. Only a very powerful control system can save it from attacks. However, it is 
not possible to install such protection on every system, because sometimes some of the 
information is public or strong protection is self-sustaining. and sometimes technical
software, or financial deficiencies. At present, this problem is solved by creating corporate 
systems, as this system unites local networks in all production departments, including large-
scale or large-scale production, and provides centralized protection and security of 
interactions. provides. 
Another problem for our country today is the computer and the devices connected to it, 
the parts of which are sometimes imported from different countries, the quality is different, 
and sometimes it is not known where they are produced (perhaps counterfeited by domestic 
companies), one Because the parameters in the assembly process do not match in the first 
place, and the position does not have the required parameters even when adjusted, it either 
runs slowly, or fails quickly, or causes frequent errors in the operation, or leads to other 
problems. . Therefore, it is not possible to require a certain normal operation of such a 
maintenance system. In general, the situation with software is no better, because the phrase 
"pirated copy", which has become a phrase of the day, can mean only one world. This 
situation can be added to the weaknesses of information systems without fear. 

Yüklə 1,48 Mb.

Dostları ilə paylaş:
1   ...   9   10   11   12   13   14   15   16   ...   38




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə