Open Access. Powered by Scholars. Published by Universities.®

Controls and Control Theory Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Chemical Engineering

Information security

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Controls and Control Theory

Identification Of Key Persons In The Information Security Incident Management Process And Distribution Of Roles Between Them, Fayzullajon Bakhtiyorovich Botirov, Sharifjon Rakhimovich Gafurov, Azam Anvorovich Gafurov Jun 2021

Identification Of Key Persons In The Information Security Incident Management Process And Distribution Of Roles Between Them, Fayzullajon Bakhtiyorovich Botirov, Sharifjon Rakhimovich Gafurov, Azam Anvorovich Gafurov

Chemical Technology, Control and Management

This research paper is devoted to the process of information security incident management and the distribution of the roles of key persons in this process. The skills required for members of the information security incident response team are considered, positions and responsibilities are given - typical positions that exist in each organization, testing and improvement procedures are given, the role of the information security incident response team members and employee positions is shown. The quality of the group leader is reflected; responsible for personnel management, scoping and reporting on the state of the organization at a higher level of the …


A Study Of Security Problems In Big Data And Their Solutions, Nozima Akhmedova Aug 2020

A Study Of Security Problems In Big Data And Their Solutions, Nozima Akhmedova

Chemical Technology, Control and Management

Statistical data on information security that concerns Big Data and is the most important for enterprises are provided. Based on this data, we studied problems such as the lack of big data practices and protection, the lack of techniques for protecting big data, the lack of standards for protecting big data, the lack of regulation of big data and ecosystems, security problems in Big Data, and proposed several proposals to improve the security of systems that use this technology.


Electronic Spam Filtering Based On Neural Networks, Tulkun Fayzievich Bekmuratov, Fayzullajon Bakhtiyorovich Botirov, Elshod Dilshod Ugli Haydarov Jul 2020

Electronic Spam Filtering Based On Neural Networks, Tulkun Fayzievich Bekmuratov, Fayzullajon Bakhtiyorovich Botirov, Elshod Dilshod Ugli Haydarov

Chemical Technology, Control and Management

This article analyzes the problem of filtering spam messages and addressing spam messages, Bayesian theorems based on artificial intelligence, LVQ algorithms (LVQ learning vector quantization) and a filtering scheme for systems based on neural networks. The direct construction of an effective neural network model of spam filtering using database recognition technology is considered. The parameters of access to the neural network how to include predefined statistical and non-statistical attributes of messages are given. The structure of neural network technology for classifying emails is also considered. The procedure for analyzing incoming data using the tool included in the analytical platform Deductor …