INFORMATION SECURITY MANAGEMENT SYSTEM UDC: 004.056.5

FULL TEXT:

Abstract

This paper offers a thorough review of the literature on the topic of information security, revealing all the principles associated with this area of ​​​​knowledge. The threats that may arise on the Internet and the measures that need to be taken to prevent these threats will be studied.


The research methods necessary to ensure the security of information systems were also examined in detail, and recommendations were proposed for building an information security management system and organizing its protection. As a result of the study, methods were proposed that allow more effective protection of confidential information from potential threats.

About the Authors

List of references

Гасымов В.А. Информационная безопасность: компьютерная преступность и кибертерроризм, Баку, Элм, 2007.

Имамвердиев Ю.Н., «Толковый словарь терминов информационной безопасности», 2015.

Алигулиев Р.М., Имамвердиев Ю.Н. Технология цифровой подписи, Баку, Элм, 2003.А.Бирюков “Информационная безопасность: защита и нападение“ (2-е изд.), 2017.

Christopher J. Hadnagy Social Engineering: The Science of Human Hacking (2nd Edition), 2018.

Agayev F.H., Mehdiyeva A.M., Gafarov G.A., Bakhshaliyeva S.V., Shirinzade N.V. Development of the functional safety system in primary oil refining Nafta-Gaz. Oil and Gas Institute — National Research Institute. Poland. ISSN 0867-8871. https://www.inig.pl/en/nafta-gaz-en/available-articles.

Mehdiyeva A.M., Sardarova İ.Z. Quliyeva S.V. Methods for Increasing Accuracy in the Process of Information Exchange and Processing. Novel Research Aspects in Mathematical and Computer Science. BP International, Vol. 4, 2022, Chapter 11, Page 108-122.

E. D. Zwicky, S. Cooper, D. Brent Chapman Building Internet Firewalls: Internet and Web Security, 2000.

Mehdiyeva A.M. Types of accidents, their causes and prevention measures. Actual problems of modern science. Proceedings of the IV International Scientific and Practical Conference. January 31-February 3, Boston, USA. 2023. pp. 441-444. https://isg-konf.com/actual-problems-of-modern-science/

Mehdiyeva A.M., Bakhtiyarov I.N., Bakhshaliyeva S.V. Increasing the Immunity of Information Transmission and Fault Tolerance of the Path. Lecture Notes on Data Engineering and Communications Technologies. Volume 166. Mobile Computing and Sustainable Informatics. Proceedings of ICMCSI 2023, 11-12 January 2023. Tribhuvan University, Nepal. pp. 775 – 784. http://icmcsi.com/2023/

D. Cappelli, A. Moore, R. Trzeciak The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering) (1st Edition), 2012.

Mehdiyeva A.M., Sardarova I.Z., Mahmudova Z.A. Development of an Information Accuracy Control System. Lecture Notes on Data Engineering and Communications Technologies. Volume 166. Mobile Computing and Sustainable Informatics. Proceedings of ICMCSI 2023, 11-12 January 2023. Tribhuvan University, Nepal. pp. 173 – 179. http://icmcsi.com/2023/

Fei Hu Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, 2016.

Honig A. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (1st Edition), 2012.

Wittkop J. Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices, 2016.

Peltier T.R. Information Security Policies, Procedures, and Standards Guidelines for Effective Information Security Management, 2001.

Diogenes Y., Dr. Erdal Ozkaya Cybersecurity — Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics, 2018.

How to Cite

Zeynalova , R. R., & Makhmudova , Z. A. (2025). INFORMATION SECURITY MANAGEMENT SYSTEM: UDC: 004.056.5 . INNOVATIVE TECHNOLOGIES, 56(4), 93–98. Retrieved from https://innotex-journal.uz/index.php/journal/article/view/96
Views: 0