The concept of providing information security in a distributed system of organizational database
Download 142.26 Kb.
|
1 2
Bog'liq1.en
III. CONCLUSION
Keeping the strengths of the AS-model and the DBS-model, the information system allows the optimal construction of the computing scheme, but increases the network traffic like the RDA-model. In practice, mixed models are used. Simple application functions and data integrity are supported by stored procedures on the server (DBS model), while more complex subject domain functions are implemented using applications on client devices (RDA model) or application server (AS model). REFERENCES Tulkun, B., & Faizullajon, B. (2019, November). Analysis of Integrated Neural Network Attack Detection System and User Behavior Models. In 2019 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE. Bekmurodov, TF, & Botirov, FB (2019). Multi-agent system of protecting information from unauthorized access. Chemical Technology, Control and Management, 2019(1), 72-77. Botirov, FB, Gafurov, SR, & Gafurov, AA (2021). Identification of key persons in the information security incident management process and distribution of roles between them. Chemical Technology, Control and Management, 2021(3), 72-77. Bekmuratov, Tulkun Fayzievich and Botirov, Faizullajon Bakhtiyorovich (2019) "Development Of Structures Of Intellectual Information Protection System," Chemical Technology, Control and Management: Vol. 2019: Iss. 5, Article 8. Available at:https://uzjournals.edu.uz/ijctcm/vol2019/iss5/8 Faizullajon, B., Azam, G., Sherzod, S. (2023). Handling Information Security Events and Incidents. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore.https://doi.org/10.1007/978-981-19-4960-9_40 Faizullajon, B., Sharifjon, G., Sherzod, S. (2023). Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore.https://doi.org/10.1007/978-981-19-4960-9_12 B. Faizullajon and G. Azam, "Stages of Processing an Information Security Incident," 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-3, doi: 10.1109/ICISCT52966.2021.9670063.
Download 142.26 Kb. Do'stlaringiz bilan baham: |
1 2
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling