252
autentifikatsiyasi
identifikator yordamida uning
haqiqiyligini tasdiqlash. Yana –
foydalanuvchini u taqdim etgan
identifikatorga mosligini tekshirish.
against them authenticator.
Also,
tocheckcomplianceagainstthem
userID.
Ijtimoiy injeneriya
xizmatchi xodimlar va foydalanuvchilar
bilan, turli nayrang, aldash va h. orqali
chalg‘itish asosidagi muloqotdan
olinadigan axborot yordamida axborot
tizimining xavfsizlik tizimini chetlab
o‘tish.
round of system of safety of
system information
by means of
information received from
contacts with the service
personnel and users on the basis
of their introduction in delusion
at the expense of various tricks,
deception and so forth.
Ikki faktorli
autentifikatsiya
foydalanuvchilarni ikkita turli faktorlar
asosida autentifikatsiyalash, odatda,
foydalanuvchi biladigan narsa va egalik
qiladigan narsa (masalan, parol va fizik
identifikatori) asosida.
user authentication based on
two different factors are usually
based on what the user knows,
and what he owns (eg
password-based
and physical
identifier).
Ko‘p faktorli
autentifikatsiya
bir necha mustaqil faktorlar asosida
foydalanish nazoratini amalga oshirish.
Autenfikatsiyaning turli usullari asosida
foydalanishni boshqarishning barqaror
tizimini amalga oshirishni tashkil etish
imkoniyatiga ega moslanuvchan
yondashish hisoblanadi. Ko‘p faktorli
autentifikatsiya texnologiyasi tarkibiga
bir martali parollar, sertifikatlar
asosidagi autentifikatsiya, kontekst
asosidagi autentifikatsiya va h. kiradi.
implementingaccesscontrol,
whichisauseridentificationbased
onseveral independent factors.
A flexible approach allows
organizations to implement
robust access control system
based on the use of different
authentication methods.
Kompyuter
jinoyatchiligi
o‘zi yoki uchinchi shaxs uchun mulkiy
foyda olish
hamda raqibiga mulkiy
ziyon yetkazish maqsadida axborot
resursidan ruxsatsiz foydalanishni, uni
modifikatsiyalashni yoki yo‘qotishni
amalga oshirish.
implementation of unauthorized
access to information resource,
its modification (fake) or
destruction for the purpose of
obtaining property benefits for
itself or for the third party, and
also for causing property
damage to the competitor.
Kompyuter tizimi
xavfsizligi
destruktiv harakatlarga va yolg‘on
axborotni zo‘rlab qabul qilinishiga olib
keluvchi ishlanadigan
va saqlanuvchi
axborotdan ruxsatsiz foydalanishga
urinishlarga kompyuter tizimining
qarshi tura olish hususiyati.
property computer systems to
resist attempts of unauthorized
access to information processed
and stored, the input of
information, leading to
destructive actions, and the
imposition of false information.
Konfidentsial
1.Mamlakat qonunchili bilan
foydalanish cheklangan hujjatlardagi
axborot
2.Foydalanuvchilar tomonidan
foydalanish huquqi cheklangan axborot.
1.Information
in documents
whose use is restricted by the
country's legislature
2.Information with restricted
access by users.
Konfidentsial
muayyan shaxsga tarkibida konfidensial authorized authorized official
253
axborotdan
foydalanish
xarakterli ma’lumot bo‘lgan axborot
bilan tanishishga vakolatli mansabdor
shaxsning ruxsati.
introduction of a particular
person with the information
containing confidential
information.
Korxona xavfsizligi
korxona o‘z faoliyatini buzilishsiz va
to‘xtalishsiz yurgiza oladigan vaqt
bo‘yicha barqaror bashoratlanuvchi
atrof-muhit holati.
stable condition projected time
environment in which the
company can
carry out their
activities without disturbances
and interruptions.
Lug‘atga asoslangan
hujum
kriptotizimga ochiq matn elementlari
lug‘atidan foydalanishga asoslangan
hujum.
attackonthecryptosystemthatuse
sadictionary of text elements
open.
Monitoring
Taqqiqotlarni tashkillashtirish shakli.
Bunda u yoki bu ob’ekt to‘g‘risida
to‘xtovsiz axborot kelib turadi
The form of organization of
research. There is a constant
flow of information about this
or that object
O‘zaro
autentifikatsiya
taraflarni autentifikatsiyalash varianti
bo‘lib, taraflarning har biri u bilan
o‘zaro harakatdagi tarafning xaqiqatan
o‘zi ekanligini tekshiradi. O‘zaro
autentifikatsiyani amalga oshiruvchi
protokolning ishtirokchilarining har biri
bir vaqtda ham isbotlovchi, ham
tekshiruvchi hisoblanadi.
Bu protokol
bajarilishning bir seansida har bir
ishtirokchining ikkinchi ishtirokchiga
aynan o‘zi ekanligini isbotlashiga
imkon beradi.
authenticationOptionpartiesinw
hich each party verifies that
interacting with her party -
namely that for which he is. A.
implemented in such a protocol
identification, in which each