BANK TO‘LOV TIZIMIGA BO‘LADIGAN RAQAMLI HUJUMLAR VA ULARNI TAHLILI
Keywords:
: Raqamli hujumlar, maxfiy moliyaviy ma’lumotlar, kiber tahdidlar, moliyaviy yo‘qotishlar, normativ muvofiqlik, operatsion amallardagi uzilishlar, ma’lumotlar buzilishi, ma’lumotlar ushlash, zaifliklardan foydalanish, soxta operatsiyalar.Abstract
Ushbu maqolada banklar va moliyaviy muassasalar uchun kiber xavflarni tushuntirish, ular bilan kurashish va kiberxavfsizlikni ta’minlashdagi muhimliklarini aks ettiradi.
References
Whitman, Michael E., and Herbert J. Mattord. "Principles of Information Security." Cengage Learning, 2018.
Pfleeger, Charles P., and Shari Lawrence Pfleeger. "Security in Computing." Pearson Education, 2015.
Whitman, Michael E., et al. "Management of Information Security." Cengage Learning, 2018.
Scarfone, Karen, and Murugiah Souppaya. "Guide to Computer Security Certification and Accreditation." CRC Press, 2006.
NIST Special Publication 800-37 Revision 2: "Risk Management Framework for Information Systems and Organizations." National Institute of Standards and Technology, 2018.
Anderson, James A., and Peter D. Nash. "Security Engineering: A Guide to Building Dependable Distributed Systems." Wiley, 2008.
NIST Special Publication 800-53 Revision 5: "Security and Privacy Controls for Information Systems and Organizations." National Institute of Standards and Technology, 2020.
Carroll, John M., et al. "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies." McGraw-Hill, 2014.
National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 11: "National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology Products." Committee on National Security Systems, 2010.
Chapple, Mike, et al. "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide." Sybex, 2018.
National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 6: "National Policy for Telecommunications and Automated Information Systems Security." Committee on National Security Systems, 2003.
Schou, Corey, and Steven Hernandez. "Information Assurance for the Enterprise: A Roadmap to Information Security." McGraw-Hill, 2007.
National Institute of Standards and Technology. "Security Standards for Federal Information Systems and Organizations." National Institute of Standards and Technology, various editions.