Abstract
This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.
First Page
64
Last Page
69
References
- Botirov, F.B., Gafurov, Sh.R. (2021). Automation of information protection processes in the enterprise information system. Ict in education: Challenges and solutions, International conference, Tashkent, 62-66.
- Botirov, F.B., Gafurov, A.A. (2021). Information security incident management processes. Ict in education: Challenges and solutions, International conference, Tashkent, 66-68.
- Botirov, F.B., Gafurov, Sh.R., Gafurov, A.A. (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical technology. control and management, 3(99), 72-77.
- Botirov, F., Gafurov, Sh. (2021). Structure and characteristics of the information security monitoring system. The use of information and communication technologies in the training of specialists in the air defense system International online scientific and practical conference, Tashkent, 375-380.
- Botirov, F., Yusupov, B., Gafurov, Sh. (2021). Assessment of reliability of information protection means in information security monitoring systems. The use of information and communication technologies in the training of specialists in the air defense system International online scientific and practical conference, Tashkent, 381-387.
- Botirov, F., Yusupov, B., Gafurov, A. (2021). A structural approach to incident management and security improvement. The use of information and communication technologies in the training of specialists in the air defense system International online scientific and practical conference, Tashkent, 388-394.
- Fayzullajon, B., Azam, G., Sherzod, S. (2023). Handling Information Security Events and Incidents. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_40.
- Fayzullajon, B., Sharifjon, G., Sherzod, S. (2023). Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_12.
- Fayzullajon, B., Azam, G. (2021). Stages of Processing an Information Security Incident. 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, 1-3. doi: 10.1109/ICISCT52966.2021.9670063.
- Botirov, F.B. (2020). Reliable risk assessment method for effective organization of information security at enterprise. Chemical Technology, Control and Management, 2020(4), 64-70.
- Botirov, F.B., Gafurov, S.R., Gafurov, A.A. (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical Technology, Control and Management, 2021(3), 72-77.
- Abdukhalil, G., Sherzod, S. (2020). Principles of Adaptation in Protecting Corporate Systems. 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, 1-4, doi: 10.1109/ICISCT50599.2020.9351461.
- Sayfullaev, S. (2020). Analysis of information security methods in biosystems and application of intelligent tools in information security systems. Chemical Technology, Control and Management, 2020(3), 72-77.
Recommended Citation
Botirov, Fayzullajon
(2023)
"INVESTIGATION OF INFORMATION SECURITY INCIDENTS IN THE ENTERPRISE,"
Chemical Technology, Control and Management: Vol. 2023:
Iss.
3, Article 9.
DOI: https://doi.org/10.59048/2181-1105.1461
Included in
Computer and Systems Architecture Commons, Digital Communications and Networking Commons, Other Computer Engineering Commons