SAFEGUARDING THE DIGITAL FRONTIER: EXPLORING MODERN CYBERSECURITY METHODS

Authors

  • Jumaev Giyosjon
  • Normuminov Anvarjon
  • Primbetov Abbaz Teacher, Computer engenering, Tashkent University of Applied Sciences giyosjonjumaev@gmail.com, anormuminov072@gmail.com, abbaz0203@mail.ru

Keywords:

Cybersecurity, Authentication, Password, Encryption, Plaintext, Ciphertext, Unauthorized access, Network, Malicious threats, Cyber attacks.

Abstract

As the digital landscape continues to evolve and cyber threats become increasingly sophisticated, organizations face significant challenges in safeguarding their sensitive data and critical systems. This article explores modern cybersecurity methods that are instrumental in enhancing protection against emerging threats.

This article presents an overview of modern cybersecurity methods that organizations can adopt to bolster their defenses in the face of evolving cyber threats. It delves into advanced authentication methods, such as multi-factor authentication and biometrics, which provide stronger identity verification and mitigate the risks associated with stolen or compromised credentials.

References

A Sophos Article 04.12v1.dNA, eighttrends changing network security by JamesLyne.

]2] Cyber Security: Understanding CyberCrimes- Sunit Belapure Nina Godbole

Computer Security Practices in NonProfit Organisations – A NetAction Reportby Audrie Krause.

A Look back on Cyber Security 2012 byLuis corrons – Panda Labs.

International Journal of Scientific &Engineering Research, Volume 4, Issue 9,September-2013 Page nos.68 – 71 ISSN2229-5518, “Study of Cloud Computing inHealthCare Industry “ by G.Nikhita Reddy,G.J.Ugander Reddy6. IEEE Security and Privacy Magazine –IEEECS “Safety Critical Systems – NextGeneration “July/ Aug 2013

(PDF) A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies. Available from: https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_Technologies [accessed Nov 15 2023].

https://cltc.berkeley.edu/scenario-back-matter/

https://www.bitdegree.org/tutorials/what-is-cyber-security/

Downloads

Submitted

2023-11-17

Published

2023-11-16