Konferensiyasi


TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE



Yüklə 1,48 Mb.
Pdf görüntüsü
səhifə15/38
tarix23.07.2023
ölçüsü1,48 Mb.
#119845
1   ...   11   12   13   14   15   16   17   18   ...   38
63ed0704130b8 19 respublika ilmiy onlayn 10-TA

TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
164 
and the risk of using them can be considered moderate or high. Because the number of 
vulnerabilities actually identified is 17.
REFERENCES: 
 
1.
Kim David. Fundamentals of Information Systems Security. -USA, 2014. -
p.544. Mark Stump. Information Security: principles and practice. -2nd ed. -USA, 2011. -
p.608. 


“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
165 
CONTINUOUS RECORDING AND AUDIT 
 
Usmonov Maxsud Tulqin o‟g‟li
Tashkent University of Information Technologies 
Karshi branch 3rd еar student 
 
Abstract:
The best way to ensure security in information systems is to be aware of 
each event that occurs in the system and to take action when necessary. In order to be 
aware of them, it is necessary to record them somewhere, that is, if it is necessary to record 
them, to take action, first analyze them and constantly check each event to determine if 
suspicious or harmful events occur. should be audited. We know that the network has 
different services, so each of them can have different types of events. It is therefore 
advisable to classify these events according to whether they occur internally or externally, 
rather than according to service.
Keywords:
Views and capabilities of these services, Active Audit Service and its tools. 
 

Yüklə 1,48 Mb.

Dostları ilə paylaş:
1   ...   11   12   13   14   15   16   17   18   ...   38




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə