Konferensiyasi


“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR


Download 1.48 Mb.
Pdf ko'rish
bet14/36
Sana25.10.2023
Hajmi1.48 Mb.
#1720390
1   ...   10   11   12   13   14   15   16   17   ...   36
Bog'liq
63ed0704130b8 19 respublika ilmiy onlayn 10-TA

“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
164 
and the risk of using them can be considered moderate or high. Because the number of 
vulnerabilities actually identified is 17.
REFERENCES: 
 
1. 
Kim David. Fundamentals of Information Systems Security. -USA, 2014. -
p.544. Mark Stump. Information Security: principles and practice. -2nd ed. -USA, 2011. -
p.608. 


“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
165 
CONTINUOUS RECORDING AND AUDIT 
 
Usmonov Maxsud Tulqin o‟g‟li 
Tashkent University of Information Technologies 
Karshi branch 3rd еar student 
 
Abstract: The best way to ensure security in information systems is to be aware of 
each event that occurs in the system and to take action when necessary. In order to be 
aware of them, it is necessary to record them somewhere, that is, if it is necessary to record 
them, to take action, first analyze them and constantly check each event to determine if 
suspicious or harmful events occur. should be audited. We know that the network has 
different services, so each of them can have different types of events. It is therefore 
advisable to classify these events according to whether they occur internally or externally, 
rather than according to service.

Download 1.48 Mb.

Do'stlaringiz bilan baham:
1   ...   10   11   12   13   14   15   16   17   ...   36




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling