• K.Z.Muminov
  • Международная научно-техническая конференция «Практическое применение технических и цифровых технологий и их инновационных решений», татуфф, Фергана, 4 мая 2023 г




    Download 6,64 Mb.
    Pdf ko'rish
    bet55/312
    Sana22.05.2024
    Hajmi6,64 Mb.
    #249488
    1   ...   51   52   53   54   55   56   57   58   ...   312
    Bog'liq
    3 tom

    Used literature 
    1. GOST R 50922-96 “Information security. Basic terms and 
    definitions" 
    2. Streltsov A.A. The content of the concept of "providing information 
    security” // Information Society No. 4. P.12 2015 
    3. International scientific journal "Symbol of Science" No. 10/2018 - 
    [Electronic resource]. – https://os- Uzbekistan.com/sn (accessed 
    20.04.2020); 
    4. Dashyan M.S. Information Highway Law – Law of Information 
    Highways: issues of legal regulation in the field of the Internet. M.: 
    VoltersKluver, 
    20171963 

    [Electronic 
    resource]. 

    http://www.telecomlaw.ru/monograph/Dashyan.pdf 
    (accessed 
    04/28/2020); 


    Muqobil energiya manbaalari va telekommunikatsiya texnologiyalarini rivojlantirishing yangi bosqichilari 
    Международная научно-техническая конференция «Практическое применение технических и 
    цифровых технологий и их инновационных решений», ТАТУФФ, Фергана, 4 мая 2023 г. 
    105
    METHODS FOR IDENTIFYING CURRENT THREATS TO 
    INFORMATION SECURITY AT THE ENTERPRISE. 
    T.M.Okhunov
    Deputy dean for work with youth, "Software engineering and digital economy", 
    Fergana branch, Tashkent University of Information Technologies named after 
    Muhammad al-Khorazmi 
    K.Z.Muminov 
    Master's degree The Ferghana Branch Tashkent university of information 
    technologies named Mukhammad al-Horazmy 
    The concept of information security management defines system of 
    provisions in the problems of regulation and coordination information security 
    management in the tax service, as well as in the interaction of tax authorities 
    with the public authorities and in the process of providing services.
    Information security management process in the tax service of the 
    Uzbekistan is regulated by a variety of legal and regulatory documents 
    representing a complex hierarchical system organizational and administrative 
    documents.
    Information security management system concept defines ways to achieve 
    the required level of management information security in the course of the 
    activities of the Tax Service of Uzbekistan. The purpose of identifying 
    information security threats is determination of the possibility of violation of the 
    basic properties of information in work process. The process of identifying and 
    defining threats to information security should be regular and systematic, and 
    should be carried out not only at the stage of creating a system information 
    security, but also at the operational stage. Necessary establish a process of 
    timely detection and neutralization of threats information security, which could 
    prevent possible damage. 
    1. Expert method. 
    Assessment of possible security threats is carried out by formation of an 
    expert group that analyzes vulnerabilities. Thanks to the qualitative formation of 
    an expert group, it is possible to reduce the level of subjectivity in assessing 
    threats. Composition of the expert group is formed in accordance with the 


    Новые этапы развития альтернативных источников энергии и телекоммуникационных технологий
    Международная научно-техническая конференция «Практическое применение технических и 
    цифровых технологий и их инновационных решений», ТАТУФФ, Фергана, 4 мая 2023 г. 
    106
    questions posed in the field information security and cannot be less than three 
    humans. Also, this method is characterized by low material costs, because the 
    experts involved are employees of the service. Despite the advantages of this 
    method, this method can be attributed also a number of significant 
    shortcomings. First of all, it is human factor that implies a certain level of 
    subjectivity that may lead to overestimation or underestimation of forecasts by 
    experts and assumptions in the process of identifying threats to information 
    security. It should be noted that the composition of the expert group cannot 
    make up employees who are directly subordinate, since this may increase the 
    likelihood of a dependent estimate. Also, experts should not have a personal, 
    commercial or other interest in deciding that is also difficult to define.
    2. Systematic method. 
    A systematic method for identifying threats to information security 
    involves a continuous process aimed at identification and definition of threats, 
    subsequent identification of the source threats and assessment of possible 
    damage in the event of a threat. On regular review and reassessment of threats to 
    information security. Providing automated monitoring can carried out both by 
    the management of the tax authorities and specialized department for 
    information security. Monitoring and control of personnel actions also applies to 
    systematic method of identifying threats. Attempted unauthorized access of an 
    employee of one level or another to confidential information will be recorded in 
    the system of the Republic Information Resource, after which the process of 
    identifying this violation will follow. 
    During the operation of the information system, the corresponding the 
    employee has the ability to change its basic configuration in such a way in a 
    manner to ensure reprioritization of significance processed information in 
    accordance with the emergence of new threats or new legal requirements. Need 
    for reassessment information security threats also appear in cases of change the 
    composition of the main components of the information system that could 
    provoke the emergence of new vulnerabilities, new information about possible 
    offenders and identifying vulnerabilities. 


    Muqobil energiya manbaalari va telekommunikatsiya texnologiyalarini rivojlantirishing yangi bosqichilari 
    Международная научно-техническая конференция «Практическое применение технических и 
    цифровых технологий и их инновационных решений», ТАТУФФ, Фергана, 4 мая 2023 г. 
    107
    Information security threat identification process involves systematic 
    identification of sources of threats, assessment opportunities and, based on this, 
    the identification of current threats information security. To identify threats 
    information security in the information system of the Tax Service is necessary 
    identify the following criteria: 
    - type and potential of violators who can carry out information security 
    threat; 
    - ways to implement threats; 
    - Vulnerabilities that can be exploited to violations, including program 
    bookmarks; 
    - objects of influence to which the threat is directed. 
    - consequences of the implementation of threats to information security. 

    Download 6,64 Mb.
    1   ...   51   52   53   54   55   56   57   58   ...   312




    Download 6,64 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Международная научно-техническая конференция «Практическое применение технических и цифровых технологий и их инновационных решений», татуфф, Фергана, 4 мая 2023 г

    Download 6,64 Mb.
    Pdf ko'rish