Abstract
This scientific article explores aspects that need to be considered in the proper
organization of security in Information Technology. Also in the process of choosing
a password are given the necessary recommendations for applying various methods,
choosing the optimal options from within them.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2023 Mullajonov Baxodirjon Arabboyevich