INFORMATION SECURITY MONITORING IN THE ELECTRONIC GOVERNMENT SYSTEM

Authors

  • Gafurov Sh. R. Independent researcher of TUIT named after Muhammad al-Khwarizmi

Keywords:

e-government, backup, monitoring, information security, random threats, incidents.

Abstract

To identify incorrect or suspicious actions and operations in voluntary web applications connected to the e-government system, it is necessary to have documented and regulated standards for monitoring and analyzing log entries, network activities and operations. This article discusses the use of information security in the e-government system to detect illegal actions monitoring is proposed.

Downloads

Published

2024-12-31

How to Cite

INFORMATION SECURITY MONITORING IN THE ELECTRONIC GOVERNMENT SYSTEM. (2024). Conferencea , 140-144. https://conferencea.org/index.php/conferences/article/view/3775