Articles
| Open Access | ANALYSIS AND ASSESSMENT OF SECURITY CONDITIONS IN TELECOMMUNICATION DATA EXCHANGE
Abibullayeva Aysanam Kadambayevna,Sag’idullaeva Malika Abat qizi , Nukus branch of the Tashkent University of Information TechnologiesAbstract
This article provides an in-depth analysis and assessment of the security conditions in telecommunication data exchange. It explores the current security challenges, potential threats, and vulnerabilities faced by telecommunication networks. The article discusses various security measures and protocols that can be implemented to protect data exchange within these networks. It also highlights the role of emerging technologies and regulatory frameworks in enhancing the security posture of telecommunication systems. The goal is to offer a comprehensive understanding of how to safeguard telecommunication data exchange against evolving cyber threats.
Keywords
telecommunication security, data exchange, cyber threats, security protocols, network vulnerabilities.
References
Surridge, M., Meacham, K., Papay, J., Phillips, S. C., Pickering, J. B., Shafiee, A., & Wilkinson, T. (2019). Modelling compliance threats and security analysis of cross border health data exchange. In New Trends in Model and Data Engineering: MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28–31, 2019, Proceedings 9 (pp. 180-189). Springer International Publishing.
He, L., Yan, Z., & Atiquzzaman, M. (2018). LTE/LTE-A network security data collection and analysis for security measurement: A survey. IEEE Access, 6, 4220-4242.
Canetti, R., & Krawczyk, H. (2001, April). Analysis of key-exchange protocols and their use for building secure channels. In International conference on the theory and applications of cryptographic techniques (pp. 453-474). Berlin, Heidelberg: Springer Berlin Heidelberg.
Staffa, M., Sgaglione, L., Mazzeo, G., Coppolino, L., d'Antonio, S., Romano, L., ... & Komnios, I. (2018). An OpenNCP-based solution for secure eHealth data exchange. Journal of Network and Computer Applications, 116, 65-85.
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.