Konferensiyasi


“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR



Yüklə 1,48 Mb.
Pdf görüntüsü
səhifə17/38
tarix23.07.2023
ölçüsü1,48 Mb.
#119845
1   ...   13   14   15   16   17   18   19   20   ...   38
63ed0704130b8 19 respublika ilmiy onlayn 10-TA

“ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 
TAKLIFLAR VA YECHIMLAR” MAVZUSIDAGI 19-SONLI RESPUBLIKA ILMIY-AMALIY ON-LINE 
KONFERENSIYASI 
www
.
bestpublishing.
org
166 
sequence of actions in breach is known) and protect its completeness. A review of the 
breach sequence will identify vulnerabilities in the services, locate the culprit, determine the 
amount and area of damage, and return to normal operation. 
The task of the audit is to identify attempts to violate information security. Until now, 
the term audit has been used to refer to the review of various reports and documents to 
determine whether they are flawed. That is, an analysis of what happened would lead to a 
conclusion. The essence of the audit we are discussing is a bit different, because it is related 
to the operation of automated systems. The audit of systems is carried out in two different 
ways - periodically, ie in a passive manner, after a certain period of time, when the account 
of events that took place during this period is analyzed and conclusions are presented, in the 
active form, each the current shocks are analyzed and the necessary recommendations or 
notifications are generated. For example, during the Soviet era, the reason for exposing the 
activities of German hackers working on behalf of the KGB secret service was to check that 
the daily reports of a large computer center differed by a few cents each day. Once more 
vulnerabilities are identified, it increases the effectiveness of the ability to address the 
system by repeatedly reconfiguring and rebuilding and performing performance checks. 
III.
 
RESULTS 
The first and second types of errors in relation to active audit tools are: missed attacks 
or unnecessary bells, respectively. The first type of mistake is not to mention how 
undesirable it is to miss an attack, but the second is a very unpleasant situation. Because it 
wastes valuable time and money, distracts from important tasks, and possibly misses a new 
attack. The advantage of the signaling method is that it is fast, leads to less errors of the 
second type, and the conclusions are based. The main drawback is that it does not recognize 
new attacks and old ones. Signature method is universal, based on conclusions, and has the 
ability to recognize attacks in an unfamiliar way, which reduces the first type of error.

Yüklə 1,48 Mb.

Dostları ilə paylaş:
1   ...   13   14   15   16   17   18   19   20   ...   38




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə