Information Security Assessment Process

Authors

  • Sultanov Kamoliddin Muxiddin o’g’li Student of Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi,
  • Beknazarova Saida Safibullaevna Doctor of Technical Sciences, professor of Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi

Keywords:

Information security, assessment process, business largely

Abstract

The IB assessment model defines the scope of assessment reflecting the context of the IB assessment within the IB assessment criterion, the mapping and transformation of the assessment into the parameters of the assessment object, and also establishes indicators that ensure the IB assessment in the field of assessment.

Downloads

Published

2022-03-27

Issue

Section

Articles

How to Cite

Information Security Assessment Process. (2022). Periodica Journal of Modern Philosophy, Social Sciences and Humanities, 4, 61-62. https://periodica.org/index.php/journal/article/view/54

Similar Articles

1-10 of 131

You may also start an advanced similarity search for this article.