UNDERSTANDING CYBERSECURITY THROUGH MORPHOLOGICAL ANALYSIS

Authors

  • Sadoqat Alimbayevna Abdirazzakova TUIT, English teacher of Foreign Languages Department Author

Keywords:

cybersecurity, terminology, morphological analysis, cyber threats, digital safety

Abstract

This article explores the importance of understanding cybersecurity terminology in today's digital age. It explains how morphological analysis, breaking down words into their component parts, helps us grasp the meaning and function of cybersecurity terms. 

References

Polyanichko, M. A. (2019). Application of a maturity model to action against internalthreats to information security. International research journal, 4 (82), 57–60. (In Russ.)

Christopher, J. (2018). The Cybersecurity Maturity Model: A Means To Measure And Improve Your Cybersecurity Program // Forbes. 01.11.2018. https://www.forbes.com/sites/forbestechcouncil/2018/11/01/thecybersecuritymaturity modelameanstomeasureandimproveyourcybersecurityprogram.

Grevatt, J. (2021). Seoul looks to enhance protection of military technologies against cyber attacks // Jane’s Defence. https://www.janes.com/defencenews/ newsdetail/seoullookstoenhanceprotectionofmilitarytechnologiesagainstcyberattacks_14765

https://www.mitnicksecurity.com/. 5.https://www.schneier.com/blog/archives/2017/02/security_and_th.html.

www.reddit.com/r/IOT/comments/ui6c7i/why_are_iot_devices_so_insecure/.

Published

2024-06-11