International Journal of Academic Pedagogical Research (IJAPR)
  Year: 2021 | Volume: 5 | Issue: 1 | Page No.: 18-23
Security Models
Usmonov Makhsud

Abstract:
The range of reasons for unauthorized use of the system is wide enough: from the excitement of playing with a computer to the feeling of domination over a disgusting manager. This is true not only for amateurs who want to have fun, but also for professional programmers. They obtain the password by choosing, guessing, or sharing it with other hackers. Some of them not only browse the files, but also become interested in the contents of the files. This is a serious threat, as it will be difficult to distinguish indulgence from malice.