WINDOWS KOMPYUTERLARI ISHGA TUSHIRISH JARAYONI: BIOS, UEFI VA KRIMINALISTIK TEKSHIRUVLARDAGI AHAMIYATI

Authors

  • Zoirov Diyorbek Dilshod o‘g‘li Author
  • Saidov Yaxshimurodbek Umidjonovich Author
  • Jalilov Muhammad Hasan og‘li Author
  • Oripov Faxriddin Aʼzamjon oʻgʻli Author

Keywords:

BIOS, UEFI, CMOS, boot ketma-ketligi, kriminalistika, Windows, ishga tushirish jarayoni, raqamli tergov, bootable media, firmware

Abstract

Ushbu maqolada zamonaviy Windows kompyuterlarining ishga tushish jarayoni, xususan BIOS va UEFI texnologiyalari, ularning funktsional farqlari, kriptografik xavfsizlik mexanizmlari va raqamli kriminalistika tekshiruvlaridagi o‘rni yoritiladi. CMOS sozlamalari, yuklash ketma-ketligi, bootable qurilmalar bilan ishlash va ma’lumotlar yaxlitligini saqlab qolish texnikasi haqida tahliliy ma’lumotlar taqdim etiladi. Shuningdek, tergov jarayonlarida BIOS/UEFI orqali aniqlanadigan izlar va ulardan qanday foydalanish mumkinligi ham ko‘rib chiqiladi.

References

1. Casey, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. 3rd Edition. Academic Press, 2011.

2. Mandia, Kevin, Prosise, Chris, & Pepe, Matt. Incident Response & Computer Forensics. 3rd Edition. McGraw-Hill, 2014.

3. Stallings, William. Operating Systems: Internals and Design Principles. 9th Edition. Pearson, 2017.

4. NIST Special Publication 800-101 Rev.1. Guidelines on Mobile Device Forensics. National Institute of Standards and Technology, 2014.

5. Guidance Software. EnCase Forensic User Manual. Version 8.09.

6. AccessData. FTK Imager User Guide. AccessData Group LLC.

7. Tanenbaum, Andrew S. & Bos, Herbert. Modern Operating Systems. 4th Edition. Pearson, 2015.

8. Ligh, Michael Hale et al. The Art of Memory Forensics. Wiley, 2014.

Downloads

Published

2025-04-20