ANALYSIS OF EXISTING THREATS AND VULNERABILITIES IN COMPUTER NETWORKS

Authors

  • Usmanbayev Daniyorbek Shukhratovich Tatu named after Muhammad al-Khorezmi, Assistant

DOI:

https://doi.org/10.17605/OSF.IO/XVGRH

Keywords:

Tarmoq, protokollar, tahdid, zaiflik, tarmoq xavfsizligi, himoya

Abstract

This article will focus on possible threats and vulnerabilities in computer networks. When comparing the internal and external vulnerabilities of the network, the shortcomings, vulnerabilities and threats contained in the protocols are caused precisely by which perimeter attacks are made. At the end of the article, suggestions and recommendations were made against these vulnerabilities.

Downloads

Published

2022-10-04

Issue

Section

Articles

How to Cite

ANALYSIS OF EXISTING THREATS AND VULNERABILITIES IN COMPUTER NETWORKS. (2022). Academicia Globe: Inderscience Research , 3(10), 53-56. https://doi.org/10.17605/OSF.IO/XVGRH