•  
  •  
 

Abstract

This research paper is devoted to the process of information security incident management and the distribution of the roles of key persons in this process. The skills required for members of the information security incident response team are considered, positions and responsibilities are given - typical positions that exist in each organization, testing and improvement procedures are given, the role of the information security incident response team members and employee positions is shown. The quality of the group leader is reflected; responsible for personnel management, scoping and reporting on the state of the organization at a higher level of the hierarchy.

First Page

72

Last Page

77

References

  1. T.F.Bekmuratov, “Konsepsiya i zadachi postroyeniya intellektualnix sistem informatsionnoy bezopasnosti” [The concept and tasks of building an intelligent information security system], Axborot texnologiyalari va kommunikatsiyalari sohasida axborot xavfsizligi va kiberxavfsizlik muammolari: Respublika miqyosidagi ilmiy-texnik konferensiya, Toshkent, 2018, pp. 4-8. (in Russian).
  2. ISO/IEC 27001 Information security management system. Requirements.
  3. S.A.Konovalenko, I.D.Korolev, “Identification of vulnerabilities of information systems”, Innovations in Science, no. 9 (58), pp. 12–20, 2016.
  4. T.F.Bekmuratov, F.B.Botirov, “Axborotni himoyalash tizimini boshqarish masalasi”, Axborot texnologiyalari va kommunikatsiyalari sohasida axborot xavfsizligi muammolari Respublika ilmiy-texnik konferensiyasi, Toshkent, 2019, pp. 151-155.
  5. A.A.Kizdermishov, S.X.Kizdermishova, “K voprosu o vvode v ekspluatatsiyu DLP-sistem” [On the question of the method of operation of the DLP system], Vestnik Adigeyskogo gosudarstvennogo universiteta, Seriya 4: Yestestvenno-matematicheskiye i texnicheskiye nauki, no. 3 (206), pp. 128–133, 2017. (in Russian).
  6. T.F.Bekmuratov, F.B.Botirov, “Development of structures of intellectual information protection system”, Сhemical technology. control and management, no. 6(90), pp. 63-71, 2019.
  7. K.V.Petuxov, Y.V.Strigunov, S.Ye.Denisenko, Metodi otsenki nadejnosti lokalnix vichislitelnix setey. Razrabotka proyekta lokalnoy vichislitelnoy seti [A method for evaluating the reliability of local computer networks. Development of a local computer network project]. Temryuk, 2017, 86 p. (in Russian).
  8. S.Herbert, “Why IIoT should make businesses rethink security”, Network Security, vol. 2019, Issue 7, July 2019, pp. 9-11.
  9. NIST SP 800-61 Computer security incident handling guide.
  10. V.I.Popov, I.D.Korolev, V.A.Larionov, “Analysis of the problems of information management and security events in information systems”, Innovations in Science, no. 12 (88), pp. 19–26, 2018.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.