METHODS OF LIMITING AUTHORIZED ACCESS AND EXIT OF INFORMATION IN COMPUTER NETWORKS

Authors

  • Kodirov Odiljon Jaloldinovich Andijan State Pedagogical Institute, teacher

Keywords:

LAN, WAN, information systems, computer networks, unauthorized access, computer viruses.

Abstract

With the widespread use of computer networks and the internet, information security issues are becoming increasingly relevant. This topic is aimed at studying the methods of restricting unauthorized access and leakage of information in computer networks. Information security is especially important in corporate networks, government organizations, and personal computers. Effective application of these methods helps prevent cases of information theft, damage, or misuse in networks.

References

Karl A. Astrom, Bjom Wittenmark. Computer-Controlled Systems: Theory and Design, Third Edition. - USA: Dover Publications, 2011. 576 p.

Fritz Klocke. Modeling and Planning of Manufacturing Processes. - Тошкент, 2016. -658p.

Olifer V.G., Olifer N.A. Computer Networks. Principles, technologies, protocols. Textbook. - 3rd edition. St. Petersburg. Peter. 2006.

Broydo V.L. Computing Systems, Networks, and Telecommunications. St. Petersburg: Piter. 2003.

Botirov T.V., Sattorov O.U., Kadirov Yo'.B., Boboyev A.A Computer Systems and Networks. Textbook.- Navoi-2019. - 443 pages.

Downloads

Published

2026-02-28

How to Cite

Kodirov Odiljon Jaloldinovich. (2026). METHODS OF LIMITING AUTHORIZED ACCESS AND EXIT OF INFORMATION IN COMPUTER NETWORKS. Ethiopian International Journal of Multidisciplinary Research, 13(2), 1449–1451. Retrieved from https://eijmr.org/index.php/eijmr/article/view/5345