Information Security Assessment Process

dc.contributor.authorSultanov Kamoliddin Muxiddin o’g’li
dc.contributor.authorBeknazarova Saida Safibullaevna
dc.date.accessioned2025-12-28T13:46:21Z
dc.date.issued2022-03-27
dc.description.abstractThe IB assessment model defines the scope of assessment reflecting the context of the IB assessment within the IB assessment criterion, the mapping and transformation of the assessment into the parameters of the assessment object, and also establishes indicators that ensure the IB assessment in the field of assessment.
dc.formatapplication/pdf
dc.identifier.urihttps://periodica.org/index.php/journal/article/view/54
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/6398
dc.language.isoeng
dc.publisherPeriodica Journal
dc.relationhttps://periodica.org/index.php/journal/article/view/54/50
dc.rightshttps://creativecommons.org/licenses/by-nc/4.0
dc.sourcePeriodica Journal of Modern Philosophy, Social Sciences and Humanities; Vol. 4 (2022): PERIODICAL; 61-62
dc.source2720-4030
dc.subjectInformation security
dc.subjectassessment process
dc.subjectbusiness largely
dc.titleInformation Security Assessment Process
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
ogli_2022_information_security_assessment_process.pdf
item.page.filesection.size
346.46 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections