BERILGANLAR BAZASIDA XAVFSIZLIK
Keywords:
Kalit so'zlar: Berilganlar bazasi, xavfsizlik, ma'lumotlar himoyasi, ruxsatsiz kirish, ma'lumotlar buzilishi, xavf-xatarlar, zamonaviy texnologiyalar.Abstract
Annotatsiya: Ushbu maqola berilganlar bazasida xavfsizlikning muhim
jihatlarini ko'rib chiqadi. Maqolada berilganlarga ruxsatsiz kirish, ma'lumotlar
buzilishi va yo'qolishining oldini olish uchun qo'llaniladigan asosiy xavfsizlik
choralari, xavf-xatarlar va ularni bartaraf etish yo'llari tahlil qilinadi.
References
Foydalanilgan adabiyotlar:
1. Kent, S. T., & Frankel, Y. (2012). NIST Special Publication 800-63-3: Digital
Identity Guidelines. National Institute of Standards and Technology (NIST).
2. Ferraiolo, D. F., Sandhu, R. S., Gavrila, S., Kuhn, D. R., & Chandramouli, R.
(2001). Role-Based Access Control. Artech House.
3. Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source
Code in C. John Wiley & Sons.
4. Oracle Documentation / Microsoft SQL Server Documentation / PostgreSQL
Documentation. (Tegishli ma'lumotlar bazasi tizimlarining rasmiy hujjatlari).
5. ISO/IEC 27002. Information technology — Security techniques — Code of practice
for information security controls.
6. CIS (Center for Internet Security) Benchmarks. (Ma'lumotlar bazalari uchun
xavfsizlik konfiguratsiyasi bo'yicha amaliy qo'llanmalar).
7. OWASP (Open Web Application Security Project) Top 10. (Web-ilovalar
xavfsizligi bo'yicha dolzarb ma'lumotlar).
8. Data Masking Solutions Providers' Whitepapers. (Masalan, Informatica, IBM,
Broadcom kabi kompaniyalarning texnik hisobotlari).
9. Research papers on "AI in Cybersecurity" or "Machine Learning for Anomaly
Detection in Databases" (Masalan, IEEE Transactions on Dependable and Secure
Computing, ACM Computing Surveys kabi nufuzli ilmiy jurnallardan).
10. Vacca, J. R. Computer Security Handbook. Auerbach Publications.