Abstract
This research paper is devoted to the process of information security incident management and the distribution of the roles of key persons in this process. The skills required for members of the information security incident response team are considered, positions and responsibilities are given - typical positions that exist in each organization, testing and improvement procedures are given, the role of the information security incident response team members and employee positions is shown. The quality of the group leader is reflected; responsible for personnel management, scoping and reporting on the state of the organization at a higher level of the hierarchy.
First Page
72
Last Page
77
References
- T.F.Bekmuratov, “Konsepsiya i zadachi postroyeniya intellektualnix sistem informatsionnoy bezopasnosti” [The concept and tasks of building an intelligent information security system], Axborot texnologiyalari va kommunikatsiyalari sohasida axborot xavfsizligi va kiberxavfsizlik muammolari: Respublika miqyosidagi ilmiy-texnik konferensiya, Toshkent, 2018, pp. 4-8. (in Russian).
- ISO/IEC 27001 Information security management system. Requirements.
- S.A.Konovalenko, I.D.Korolev, “Identification of vulnerabilities of information systems”, Innovations in Science, no. 9 (58), pp. 12–20, 2016.
- T.F.Bekmuratov, F.B.Botirov, “Axborotni himoyalash tizimini boshqarish masalasi”, Axborot texnologiyalari va kommunikatsiyalari sohasida axborot xavfsizligi muammolari Respublika ilmiy-texnik konferensiyasi, Toshkent, 2019, pp. 151-155.
- A.A.Kizdermishov, S.X.Kizdermishova, “K voprosu o vvode v ekspluatatsiyu DLP-sistem” [On the question of the method of operation of the DLP system], Vestnik Adigeyskogo gosudarstvennogo universiteta, Seriya 4: Yestestvenno-matematicheskiye i texnicheskiye nauki, no. 3 (206), pp. 128–133, 2017. (in Russian).
- T.F.Bekmuratov, F.B.Botirov, “Development of structures of intellectual information protection system”, Сhemical technology. control and management, no. 6(90), pp. 63-71, 2019.
- K.V.Petuxov, Y.V.Strigunov, S.Ye.Denisenko, Metodi otsenki nadejnosti lokalnix vichislitelnix setey. Razrabotka proyekta lokalnoy vichislitelnoy seti [A method for evaluating the reliability of local computer networks. Development of a local computer network project]. Temryuk, 2017, 86 p. (in Russian).
- S.Herbert, “Why IIoT should make businesses rethink security”, Network Security, vol. 2019, Issue 7, July 2019, pp. 9-11.
- NIST SP 800-61 Computer security incident handling guide.
- V.I.Popov, I.D.Korolev, V.A.Larionov, “Analysis of the problems of information management and security events in information systems”, Innovations in Science, no. 12 (88), pp. 19–26, 2018.
Recommended Citation
Botirov, Fayzullajon Bakhtiyorovich; Gafurov, Sharifjon Rakhimovich; and Gafurov, Azam Anvorovich
(2021)
"IDENTIFICATION OF KEY PERSONS IN THE INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS AND DISTRIBUTION OF ROLES BETWEEN THEM,"
Chemical Technology, Control and Management: Vol. 2021:
Iss.
3, Article 9.
DOI: https://doi.org/10.51346/tstu-02.21.3-77-0023
Included in
Complex Fluids Commons, Controls and Control Theory Commons, Industrial Technology Commons, Process Control and Systems Commons