• REFERENCES
  • “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
  • Usmonov Maxsud Tulqin o‟g‟li Tashkent University of Information Technologies Karshi branch 3rd еar student Abstract
  • “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR




    Download 1.48 Mb.
    Pdf ko'rish
    bet14/36
    Sana22.07.2023
    Hajmi1.48 Mb.
    #77142
    1   ...   10   11   12   13   14   15   16   17   ...   36
    Bog'liq
    63ed0704130b8 19 respublika ilmiy onlayn 10-TA
    шахриёр диссертация, МАЖМУА 2022-23, 1-qoldirilgan dars maruza, Лабаротория № 2, togri javoblar, Erkinov Muhammadali, fizika 2 mavzu 10, KATTA ASHULA VA UNING IJROCHILIK ANANALARI, Sobirjon KURS ISHI, 3-topshiriq, IQTISODIYOTDA AXBOROT-KOMMUNIKATSIYA TEXNOLOGIYALAR VA TIZIMLAR
    “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
    TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
    KONFERENSIYASI 
    www
    .
    bestpublishing.
    org
    164 
    and the risk of using them can be considered moderate or high. Because the number of 
    vulnerabilities actually identified is 17.
    REFERENCES: 
     
    1. 
    Kim David. Fundamentals of Information Systems Security. -USA, 2014. -
    p.544. Mark Stump. Information Security: principles and practice. -2nd ed. -USA, 2011. -
    p.608. 


    “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
    TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
    KONFERENSIYASI 
    www
    .
    bestpublishing.
    org
    165 
    CONTINUOUS RECORDING AND AUDIT 
     
    Usmonov Maxsud Tulqin o‟g‟li 
    Tashkent University of Information Technologies 
    Karshi branch 3rd еar student 
     
    Abstract: The best way to ensure security in information systems is to be aware of 
    each event that occurs in the system and to take action when necessary. In order to be 
    aware of them, it is necessary to record them somewhere, that is, if it is necessary to record 
    them, to take action, first analyze them and constantly check each event to determine if 
    suspicious or harmful events occur. should be audited. We know that the network has 
    different services, so each of them can have different types of events. It is therefore 
    advisable to classify these events according to whether they occur internally or externally, 
    rather than according to service.

    Download 1.48 Mb.
    1   ...   10   11   12   13   14   15   16   17   ...   36




    Download 1.48 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR

    Download 1.48 Mb.
    Pdf ko'rish