“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR,
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI
www
.
bestpublishing.
org
163
to all users. It is not always possible to identify an external customer who accesses the
system in the process of communicating over the network. This is because there are now
thousands of opportunities to disguise themselves, so the chances of attacking systems are
just as high. Only a very powerful control system can save it from attacks. However, it is
not possible to install such
protection on every system, because sometimes some of the
information is public or strong protection is self-sustaining.
and sometimes technical,
software, or financial deficiencies. At present, this problem is solved by creating corporate
systems, as this system unites local networks in all production departments, including large-
scale or large-scale production, and provides centralized
protection and security of
interactions. provides.
Another problem for our country today is the computer and the devices connected to it,
the parts of which are sometimes imported from different countries, the quality is different,
and sometimes it is not known where they are produced (perhaps counterfeited by domestic
companies), one Because the parameters in the assembly process do not
match in the first
place, and the position does not have the required parameters even when adjusted, it either
runs slowly, or fails quickly, or causes frequent
errors in the operation, or leads to other
problems. . Therefore, it is not possible to require a certain
normal operation of such a
maintenance system. In general, the situation with software is no better, because the phrase
"pirated copy", which has become a phrase of the day, can mean only one world. This
situation can be added to the weaknesses of information systems without fear.
Dostları ilə paylaş: