“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR,
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI
www
.
bestpublishing.
org
164
and the risk of using them can be considered moderate or high. Because the number of
vulnerabilities actually identified is 17.
REFERENCES:
1.
Kim David. Fundamentals of Information Systems Security. -USA, 2014. -
p.544. Mark Stump. Information Security: principles and practice. -2nd ed. -USA, 2011. -
p.608.
“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR,
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE
KONFERENSIYASI
www
.
bestpublishing.
org
165
CONTINUOUS RECORDING AND AUDIT
Usmonov Maxsud Tulqin o‟g‟li
Tashkent University of Information Technologies
Karshi branch 3rd еar student
Abstract: The best way to ensure security in information systems is to be aware of
each event that occurs in the system and to take action when necessary. In order to be
aware of them, it is necessary to record them somewhere, that is, if it is necessary to record
them, to take action, first analyze them and constantly check each event to determine if
suspicious or harmful events occur. should be audited. We know that the network has
different services, so each of them can have different types of events. It is therefore
advisable to classify these events according to whether they occur internally or externally,
rather than according to service.
Do'stlaringiz bilan baham: |