Analysis of Computer Crime Incidents
Keywords:
Computer crime, use of banking services, DoS attack, hackingAbstract
"Algorithms for predicting measures to ensure information security based on the analysis of computer crime incidents", computer crime, its types and reasons for committing were analyzed. In Maskur's article, a network traffic analysis algorithm generated several time series between different sets of infrastructure as a result of short-term forecasting and monitoring. If each observed value does not exist within the confidence interval, such information is called a risk, that is, an incident
References
Decree of the President of the Republic of Uzbekistan on the new development strategy of Uzbekistan for 2022-2026 2022
On the basis of the following article "Computer crime is becoming a real source of danger in our country" - Qilichev.U.V, the operative representative of the department for combating crimes in the field of information technologies, lieutenant colonel. 23.12.2019;
Fedotov N.N. DoSataki v Sethi. Introduction, tekushchaya practice and prognosis // magazine "Dokumentalnaya elektrosvyaz". 2015, No. 13 (http://www.rtcomm.ru/about/press/pa/?id=429).
Phishing Exposed. "Syngress Publishing",
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
User Rights
Under the Creative Commons Attribution-NonCommercial 4.0 International (CC-BY-NC), the author (s) and users are free to share (copy, distribute and transmit the contribution).
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.