Научная статья на тему 'CYBERSECURITY IS IN BUSINESS'

CYBERSECURITY IS IN BUSINESS Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY
29
7
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
digitalization / cybersecurity / network security
i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «CYBERSECURITY IS IN BUSINESS»

- такие установки кондиционирования воздуха могут совместно работать с системами отопления и вентиляции;

- существует возможность гибкого регулирования компенсации тепловых потерь в зависимости от температуры наружного воздуха.

Список использованной литературы:

1. Системы вентиляции и кондиционирования: учеб. пособие / В.А. Ананьев, Л.Н. Балуева, А.Д. Гальперин [и др.] // М.: Евроклимат, Изд-во «Арина», 2000. -416 с.

2. Невский, В.В. Тепло-холодоснабжение отопительно-вентиляционных установок // М.: ООО «Данфосс», 2009.

3. Пырков, В.В. Гидравлическое регулирование систем отопления и охлаждения // Киев: Ташсправ^ 2005

4. Истратова Ю.В., Семиненко А.С., Минко В.А. Сравнительные критерии систем отопления // в сборнике: Энергосбережение и экология в жилищно-коммунальном хозяйстве и строительстве городов: изд-во БГТУ, 2012. С. 237-239.

5. Руфтопы YORK серии 20 sunline 180-300 [Электронный ресурс]. - Режим доступа: http://vent-rooftop.ru/prevaya/kryshnye-ustanovki-ruftopy-york/ruftopy-york-seriya-20-sunline-180-300/, свободный. -Загл. с экрана.

©Раимбакиев И.Д., 2023

УДК 62

Рахыев Д., преподаватель Халидов А., студент Аманова К., студентка

Институт инженерно-технических и транспортных коммуникаций Туркменистана CYBERSECURITY IS IN BUSINESS Key words

digitalization, cybersecurity, network security.

The policy of Honorable President of Turkmenistan aimed at comprehensive harmonious development of the state and the society is reflected in the state programs of comprehensive development that are implemented successfully for the good of the people of the country, based on the principle «The state is for a man! ». Article 16 of the Constitution of Turkmenistan identifies that the state promotes the development of science, engineering and technologies, as well as supports the international cooperation in these areas. These constitutional norms are reflected in the laws of Turkmenistan «On communications», «On national scientific-technological policy», «On innovation activity», «On scientific-technological parks», «On legal regulation of Internet arranging and Internet services providing in Turkmenistan», «On electronic document, electronic document management and digital services», «On information and its protection», «On cyber security».

The latest achievements of science and technology have raised the pace of economic and life development of human society to a new level. Today, the new stage of development and reforms known as the "digital economy" marks the organization of economic relations with the help of innovative technologies.

The introduction of digital technologies into the economy and life system is defined as the main direction of the state policy in our independent country, where purposeful, high-capacity activities lead to prosperity and development. Phased transition to the digital economy in the country is carried out in accordance with the Concept of the Development of the Digital Economy in Turkmenistan in 2019-2025. Also, in order to bring the development of the national economy to the level of the world's stable developing countries, introducing advanced practices and technologies is one of the main tasks of the "Program of socio-economic development of the country of the President of Turkmenistan in 2019-2025". Widespread introduction of the digital system in the country's industries is being intensified in accordance with the Law of Turkmenistan "On Electronic Documents, Electronic Document Circulation and Digital Services". With the help of today's advanced technologies and communication system, the collection, analysis, use and dissemination of information related to the economic sector is becoming more important.

The digital economy is a global network of economic activity, commercial transactions and professional communications enabled by information and communication technologies. An economy based on digital technologies creates new ways of production, new demands on people's knowledge and work skills. The introduction of the digital economy creates conditions for increasing the pace of economic growth and production in the country, and improving the management structure.

At the same time, the active use of the Internet and other key components of cyberspace can create new, more serious threats. In order to protect national "cyber independence" and prevent harmful hacking attacks, the country adopted the "Cyber Security" Law. It defines the procedure and specificity of ensuring the security of information content in strategically important sectors.

Cybersecurity (sometimes called computer security) is a collection of methods and practices for protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Cybersecurity is used in a variety of fields, from business to mobile technology. Several main categories can be distinguished in this area.

Network security — Actions taken to protect computer networks from various threats, such as targeted attacks or malware.

App security — Protect devices from threats criminals can hide in apps. Once infected, the program can access data that an attacker should be able to protect. The security of the software is also ensured during development, before it appears in open sources.

Data security — ensuring the integrity and confidentiality of data in storage and transit.

Operational security — managing and protecting information assets. This category includes, for example, network access permissions or rules that determine where and how data can be stored.

Raise awareness — educate users. This approach helps reduce the most unpredictable factor in the cyber security industry - the human impact. Even the most secure system can be attacked due to someone's mistake or ignorance. Therefore, every organization should conduct training for employees and tell them about the basic rules: for example, there is no need to open suspicious e-mail attachments or plug in suspicious USB devices.

Literature:

1. The Constitution of Turkmenistan - Ashgabat: Turkmen State Publishing Service, 2023

2. The Law of Turkmenistan «On Administrative Procedures» //Bulletin of Mejlis of Turkmenistan - 2017

3. Scientific commentary to the Law of Turkmenistan «On Administrative Procedures» - Ashgabat: Turkmen State Publishing Service, 2020

© PaxbieB fl., Xa^MflOB A., AMaHOBa K., 2023

i Надоели баннеры? Вы всегда можете отключить рекламу.