•  
  •  
 

Abstract

This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.

First Page

86

Last Page

92

References

  1. Fayzullajon, B., Azam, G., Sherzod, S. (2023). Handling Information Security Events and Incidents. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_40.
  2. Fayzullajon, B., Sharifjon, G., Sherzod, S. (2023). Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_12.
  3. Fayzullajon, B., Azam, G. (2021). Stages of Processing an Information Security Incident. 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-3, doi: 10.1109/ICISCT52966.2021.9670063.
  4. Botirov, F.B. (2020). RELIABLE RISK ASSESSMENT METHOD FOR EFFECTIVE ORGANIZATION OF INFORMATION SECURITY AT ENTERPRISE. Chemical Technology, Control and Management, 2020(4), 64-70.
  5. Botirov, F.B., Gafurov, S.R., Gafurov, A.A. (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical Technology, Control and Management, 2021(3), 72-77.
  6. Abdukhalil, G., Sherzod, S. (2020). Principles of Adaptation in Protecting Corporate Systems. 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-4, doi: 10.1109/ICISCT50599.2020.9351461.
  7. Sayfullaev, S. (2020). ANALYSIS OF INFORMATION SECURITY METHODS IN BIOSYSTEMS AND APPLICATION OF INTELLIGENT TOOLS IN INFORMATION SECURITY SYSTEMS. Chemical Technology, Control and Management, 2020(3), 72-77.
  8. Zaynutdinova, M., Sayfullaev, S. (2021). Analysis and Modeling of Information Security Systems in Industry 4.0. In: Aliev, R.A., Yusupbekov, N.R., Kacprzyk, J., Pedrycz, W., Sadikoglu, F.M. (eds) 11th World Conference “Intelligent System for Industrial Automation” (WCIS-2020). WCIS 2020. Advances in Intelligent Systems and Computing, 1323. Springer, Cham. https://doi.org/10.1007/978-3-030-68004-6_2.
  9. Botirov, F.B., Gafurov, Sh.R. (2021). Automation of information protection processes in the enterprise information system. Ict in education: Challenges and solutions, International conference, Tashkent, 62-66.
  10. Botirov, F.B., Gafurov, A.A. (2021). Information security incident management processes, Ict in education: Challenges and solutions, International conference, Tashkent, 66-68.
  11. Botirov, F.B., Gafurov, Sh.R., Gafurov, A.A. (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical technology. control and management, 3(99), 72-77.
  12. Botirov, F., Gafurov, Sh. (2021). Structure and characteristics of the information security monitoring system. The use of information and communication technologies in the training of specialists in the air defense system International online scientific and practical conference, Tashkent, 375-380.
  13. Botirov, F., Yusupov, B., Gafurov, Sh., Assessment of reliability of information protection means in information security monitoring systems. The use of information and communication technologies in the training of specialists in the air defense system International online scientific and practical conference, Tashkent, 381-387.
  14. Botirov, F., Yusupov, B., Gafurov, A. (2021). A structural approach to incident management and security improvement. The use of information and communication technologies in the training of specialists in the air defense system International online scientific and practical conference, Tashkent, 388-394.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.