{"id":4238,"date":"2023-10-27T08:20:58","date_gmt":"2023-10-27T03:20:58","guid":{"rendered":"http:\/\/vestnik.polytech.tj\/?p=4238"},"modified":"2023-10-27T08:24:14","modified_gmt":"2023-10-27T03:24:14","slug":"the-methods-of-protecting-information-in-telecommunication-systems","status":"publish","type":"post","link":"https:\/\/vestnik.polytech.tj\/?p=4238&lang=en","title":{"rendered":"THE METHODS OF PROTECTING INFORMATION IN  TELECOMMUNICATION SYSTEMS"},"content":{"rendered":"<h4><strong>Authors<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0Abdulla-zade M.Kh. \u2013<\/strong> <em>A<\/em><em>spirant<\/em><em> the Department of History of Science and Technology, senior<\/em><em>\u00a0lecturer at the Department of Multi-Network Telecommunication Systems, Khujand State <\/em><\/p>\n<p><em>University, Khujand, Republic of Tajikistan, <\/em><em><u>abdullazade.mazbut@mail.ru<\/u><\/em><\/p>\n<p><strong>\u00a0Goibov S.A. \u2013<\/strong> <em>Head of the Branch of OJSC<\/em><em> (O<\/em><em>pen joint stock company<\/em><em>)<\/em><em> &#171;Tojiktelecom&#187; of <\/em><em>the Sughd region, <\/em><em>aspirant<\/em><em> the organization of education &#171;Belarusian State Academy of <\/em><\/p>\n<p><em>Communications&#187;, Republic of Belarus, <\/em><em><u>goibov70@mail.ru<\/u><\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<h4><strong><em>Annotation<\/em><\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p><em>\u00a0 The article examines the process of development of information technology and the comprehensive use of computers in all areas of human activity. The problem of raising the degree of information security to a higher level is being solved. It is noted that in modern conditions it is required to find a solution to the problem, taking into account a set of new conditions for the circulation of information, the creation and use of information resources, which are collectively called the information environment. Nowadays, when the volume of received and processed information is growing steadily, its value is also increasing. At the same time, it is required that the transmitted information reaches the addressee and the original owner in a timely manner, without distortion, in accordance with the rules. A promising solution to this problem of information security or information protection is the differentiation of access to a given flow. <\/em><em>To <\/em><em>achieve this, can be used the routers with the &#171;VPN-builder&#187; function. It is concluded that this function can only be performed using reliable cryptographic tools. In such cases, special attention should be <\/em><em>given<\/em><em> to the key system and the reliability of their storage. The requirements for access policy when separating the direction of transmitted information is fundamentally different from the requirements when restricting access to files and folders. Here only the simplest mechanism is possible &#8212; access to the user is allowed or denied.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h4><strong><em>Keywords<\/em><\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p><em>information security, standards, data protection system, data storage, information society, various protection methods<\/em><\/p>\n<p>&nbsp;<\/p>\n<h4><strong><em>References<\/em><\/strong><\/h4>\n<p>&nbsp;<\/p>\n<ol>\n<li><em> Avezov A. H. Application of information technologies for teaching scientific creativity. Bulletin of the Tajik State University of Law, Business and Politics. 2014. No. 1 (57). pp. 316-327.<\/em><\/li>\n<li><em> Babash A.V. Information security. Laboratory workshop: Textbook \/ A.V. Babash, E. K. Baranova, Yu. N. Melnikov. &#8212; M.: KnoRus, 2016 \u2014 &#8212; 136 p.<\/em><\/li>\n<li><em> Gafner V. V. Information security: A textbook \/ V. V. Gafner. &#8212; Ph\/D: Phoenix, 2017 \u2014 &#8212; 324 p.<\/em><\/li>\n<li><em> Gromov Yu. Yu. Information security and information protection: A textbook \/ Yu. Yu. Gromov, V. O. Drachev, O. G. Ivanova. &#8212; St. Oskol: TNT, 2017. &#8212; 384 p.<\/em><\/li>\n<li><em> Efimova L.L. Information security of children. Russian and foreign experience: A monograph \/ L. L. Efimova, S. A. Kocherga. &#8212; Moscow: UNITY-DANA, 2016 \u2014 &#8212; 239 p.<\/em><\/li>\n<li><em> Efimova L.L. Information security of children. Russian and foreign experience. Monograph. Vulture of the UMC &#171;Professional textbook&#187;. Gryph of the Research Institute of Education and Science. \/ L.L. Efimova, S. A. Kocherga. &#8212; Moscow: UNITY, 2016 \u2014 &#8212; 239 p.<\/em><\/li>\n<li><em> Zapechnikov S.V. Information security of open systems. In 2 t. T. 2 \u2014 protection in networks \/ S.V. Tabachnikov, N.G. Miloslavskaya, I.A. Tolstoy, D.V. Ushakov. \u2014 M.: GLT, 2018. \u2014 558 c. <\/em><\/li>\n<li><em> Malyuk A. A. Information security: conceptual and methodological logical foundations of information security A. A. Malyuk. \u2014 M.: GLT, 2016. \u2014 280 c. <\/em><\/li>\n<li><em> Partyka T.L. Information security: textbook \/ T.L. Partyka, I.I. Popov. \u2014 M.: Forum, 2016. \u2014 432 c. 10. Petrov, S.V. Information security: textbook \/ S.V. Petrov, I.P. Slinkova V. Hafner. \u2014 M.: ART, 2016. \u2014 296 c.<\/em><\/li>\n<li><em> Semenenko V.A. Information security: A textbook \/ V.A. Semenenko. &#8212; M.: MGIU, 2017. \u2014 277 p.<\/em><\/li>\n<li><em> Chipiga A.F. Information security of automated systems \/ A.F. Chipiga. &#8212; M.: Helios ARV, 2017. \u2014 336 p.<\/em><\/li>\n<li><em> Shangin V.F. Protection of computer information. Effective methods and means. Moscow: DMK Press, 2008. &#8212; 544 p. &#8212; ISBN 5-94074-383-8.<\/em><\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication date<\/strong><\/p>\n<p>2023-10-27<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors &nbsp; \u00a0Abdulla-zade M.Kh. \u2013 Aspirant the Department of History of Science and Technology, senior\u00a0lecturer at the Department of Multi-Network Telecommunication Systems, Khujand State University, Khujand, Republic of Tajikistan, abdullazade.mazbut@mail.ru \u00a0Goibov S.A. \u2013 Head of the Branch of OJSC (Open joint stock company) &#171;Tojiktelecom&#187; of the Sughd region, aspirant the organization of education &#171;Belarusian State Academy of Communications&#187;, Republic of Belarus, goibov70@mail.ru \u00a0 Annotation &nbsp; \u00a0 The article examines the process of development of information technology and the comprehensive use of computers in all areas of human activity. The problem&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[91],"class_list":["post-4238","post","type-post","status-publish","format-standard","hentry","category-bulletin_of_pittu_2020","tag-bulletin-of-pittu-2020-4"],"acf":[],"featured_image_src":null,"author_info":{"display_name":"Ilhomjon Qodirov","author_link":"https:\/\/vestnik.polytech.tj\/?author=3"},"_links":{"self":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts\/4238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4238"}],"version-history":[{"count":3,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts\/4238\/revisions"}],"predecessor-version":[{"id":4241,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts\/4238\/revisions\/4241"}],"wp:attachment":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}