•  
  •  
 

Abstract

This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.

First Page

89

Last Page

94

References

  1. Fayzullajon, B., Azam, G., Sherzod, S. (2023). Handling Information Security Events and Incidents. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_40
  2. Fayzullajon, B., Sharifjon, G., Sherzod, S. (2023). Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_12
  3. Fayzullajon, B. Azam, G. (2021). Stages of Processing an Information Security Incident. 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-3, doi: 10.1109/ICISCT52966.2021.9670063.
  4. Botirov, F.B. (2020). Reliable Risk Assessment Method for Effective Organization of Information Security at Enterprise. Chemical Technology, Control and Management, 2020(4), 64-70.
  5. Botirov, F.B., Gafurov, S. R., Gafurov, A.A. (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical Technology, Control and Management, 2021(3), 72-77.
  6. Abdukhalil, G., Sherzod, S. (2020). Principles of Adaptation in Protecting Corporate Systems, 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-4, doi: 10.1109/ICISCT50599.2020.9351461.
  7. Sayfullaev, S. (2020). Analysis of Information Security Methods in Biosystems and Application of Intelligent Tools in Information Security Systems. Chemical Technology, Control and Management, 2020(3), 72-77.
  8. Zaynutdinova, M., Sayfullaev, S. (2021). Analysis and Modeling of Information Security Systems in Industry 4.0. In: Aliev, R.A., Yusupbekov, N.R., Kacprzyk, J., Pedrycz, W., Sadikoglu, F.M. (eds) 11th World Conference “Intelligent System for Industrial Automation” (WCIS-2020). WCIS 2020. Advances in Intelligent Systems and Computing, 1323. Springer, Cham. https://doi.org/10.1007/978-3-030-68004-6_2
  9. Farhadzadeh, E.M. (2021). Comparison And Ranking Of Operational Reliability Indicators Of Overhead Transmission Lines Of Electric Power Systems. Reliability: Theory and Applications. 16(4, 186-196. DOI: 10.24412/1932-2321-2021-465-186-196.
  10. Konichenko, A.V., Ostrovskiy, E.O., Uryaseva, M.V. (2021). The model for computation of complex technical objects parameters based on subdefinite calculations. Journal of Physics: Conference Series, 1843(1), 012008. DOI: 10.1088/17426596/1843/1/012008.
  11. Yan, Y., Li, M., Dai, L., Guo, J., Dai, H., Tang, W. (2022). Construction of "Space-Sky-Ground" Integrated Collaborative Monitoring Framework for Surface Deformation in Mining Area. Remote Sensing. 14(4), 840. DOI: 10.3390/rs14040840.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.