Abstract
This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.
First Page
89
Last Page
94
References
- Fayzullajon, B., Azam, G., Sherzod, S. (2023). Handling Information Security Events and Incidents. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_40
- Fayzullajon, B., Sharifjon, G., Sherzod, S. (2023). Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_12
- Fayzullajon, B. Azam, G. (2021). Stages of Processing an Information Security Incident. 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-3, doi: 10.1109/ICISCT52966.2021.9670063.
- Botirov, F.B. (2020). Reliable Risk Assessment Method for Effective Organization of Information Security at Enterprise. Chemical Technology, Control and Management, 2020(4), 64-70.
- Botirov, F.B., Gafurov, S. R., Gafurov, A.A. (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical Technology, Control and Management, 2021(3), 72-77.
- Abdukhalil, G., Sherzod, S. (2020). Principles of Adaptation in Protecting Corporate Systems, 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-4, doi: 10.1109/ICISCT50599.2020.9351461.
- Sayfullaev, S. (2020). Analysis of Information Security Methods in Biosystems and Application of Intelligent Tools in Information Security Systems. Chemical Technology, Control and Management, 2020(3), 72-77.
- Zaynutdinova, M., Sayfullaev, S. (2021). Analysis and Modeling of Information Security Systems in Industry 4.0. In: Aliev, R.A., Yusupbekov, N.R., Kacprzyk, J., Pedrycz, W., Sadikoglu, F.M. (eds) 11th World Conference “Intelligent System for Industrial Automation” (WCIS-2020). WCIS 2020. Advances in Intelligent Systems and Computing, 1323. Springer, Cham. https://doi.org/10.1007/978-3-030-68004-6_2
- Farhadzadeh, E.M. (2021). Comparison And Ranking Of Operational Reliability Indicators Of Overhead Transmission Lines Of Electric Power Systems. Reliability: Theory and Applications. 16(4, 186-196. DOI: 10.24412/1932-2321-2021-465-186-196.
- Konichenko, A.V., Ostrovskiy, E.O., Uryaseva, M.V. (2021). The model for computation of complex technical objects parameters based on subdefinite calculations. Journal of Physics: Conference Series, 1843(1), 012008. DOI: 10.1088/17426596/1843/1/012008.
- Yan, Y., Li, M., Dai, L., Guo, J., Dai, H., Tang, W. (2022). Construction of "Space-Sky-Ground" Integrated Collaborative Monitoring Framework for Surface Deformation in Mining Area. Remote Sensing. 14(4), 840. DOI: 10.3390/rs14040840.
Recommended Citation
Botirov, Fayzullajon
(2023)
"PROCEDURAL MODEL OF THE MONITORING SYSTEM,"
Chemical Technology, Control and Management: Vol. 2023:
Iss.
1, Article 12.
DOI: https://doi.org/10.59048/2181-1105.1430
Included in
Computer and Systems Architecture Commons, Digital Communications and Networking Commons, Other Computer Engineering Commons