{"title":"Information security requirements in monitoring e-government systems","authors":"Azam Gafurov , Fayzullajon Botirov","doi":"10.1016/j.procs.2025.01.001","DOIUrl":null,"url":null,"abstract":"<div><div>This article examines the requirements for information security in monitoring e-government systems. It discusses the information security framework for eGoverment system, a model for organizing multi-level network security based on layered protection. This research study also covers the establishment of information security zones with eGovernment. and the importance of ensuring the local information securityand the process of connecting information security to a corporate network. It addresses the security measures for remote access and the use of automated control systems, such as VPN connections.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"252 ","pages":"Pages 424-429"},"PeriodicalIF":0.0000,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Procedia Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1877050925000018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article examines the requirements for information security in monitoring e-government systems. It discusses the information security framework for eGoverment system, a model for organizing multi-level network security based on layered protection. This research study also covers the establishment of information security zones with eGovernment. and the importance of ensuring the local information securityand the process of connecting information security to a corporate network. It addresses the security measures for remote access and the use of automated control systems, such as VPN connections.