{"title":"形成信息系统攻击源列表的程序","authors":"Bekmirzaev Obidjon Nuralievich, Muminov Bahodir Boltaevich, Bekmurodov Ulugbek Bahrom Ugli","doi":"10.1109/ICISCT55600.2022.10146884","DOIUrl":null,"url":null,"abstract":"the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Procedure for Forming a List of Sources of Attack in the Information System\",\"authors\":\"Bekmirzaev Obidjon Nuralievich, Muminov Bahodir Boltaevich, Bekmurodov Ulugbek Bahrom Ugli\",\"doi\":\"10.1109/ICISCT55600.2022.10146884\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.\",\"PeriodicalId\":332984,\"journal\":{\"name\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT55600.2022.10146884\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10146884","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Procedure for Forming a List of Sources of Attack in the Information System
the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.