CYBER THREATS, VULNERABILITIES AND RISKS IN ECONOMIC SECTORS

Authors

  • Ibragimov Nodirjon Nusriddinovich iffn (PHD), TUIT Karshi Branch IT-Service Department Associate Professor
  • Askarova Nargiza Ilhomkhojayevna TUIT Karshi Branch IT Department Assistant
  • Amirov Akbarshakh Dilshad son TUIT Karshi Branch IS-11-20 Group Student
  • Abdurakhmanov Vahid Abdumuqim son TUIT Karshi Branch IS-12-20 Group Student

Keywords:

DDoS, Phishing, SQL Injections

Abstract

Terms such as cyberthreats, vulnerabilities, and risks are often used interchangeably and confused. This article aims to define each term, highlight how they differ, and show how they relate to each other.

References

Шубинский И.Б. Структурная надёжность информационных систем. Методы анализа /Ульяновск: Печатный двор, 2012.

BS 31100:2008. Risk management — Code of practice.

BS OHSAS 18001:2007. Occupational health and safety management systems. Requirements.

CWA 15793:2008. Laboratory biorisk management standard.

ISO/IEC 51:1999. Safety aspects — Guidelines for their inclusion in standards.

ISO/IEC Guide 73:2009. Risk management — Vocabulary — Guidelines for use in standards.

ISO 31000:2009. Risk management — Principles and guidelines.

IEC/ISO 31010:2009. Risk management — Risk assessment techniques.

ISO 15190:2003. Medical laboratories — Requirements for safety.

Reason J. Human error. — New York: Cambridge University Press, 1990. —316 p.

Downloads

Published

2022-09-26

Issue

Section

Articles

Most read articles by the same author(s)