<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-4-0-3</article-id><article-id pub-id-type="publisher-id">1879</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>NETWORK SECURITY INCIDENTS  IN THE DIGITAL ECONOMY SYSTEM</article-title><trans-title-group xml:lang="en"><trans-title>NETWORK SECURITY INCIDENTS  IN THE DIGITAL ECONOMY SYSTEM</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Oladko</surname><given-names>Vladlena Sergeevna</given-names></name><name xml:lang="en"><surname>Oladko</surname><given-names>Vladlena Sergeevna</given-names></name></name-alternatives><email>oladko.vs@yandex.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/4/ИТ_3.pdf" /><abstract xml:lang="ru"><p>The modern period of development is closely related to the digital transformation of various industries and the implementation of the Digital Economy program in the Russian Federation. One of the factors for the successful implementation and effective development of such a sociotechnical system is ensuring the cybersecurity of objects and entities in the processes of processing and transmitting information, and obtaining digital services. The study of the problems of ensuring its security is an important scientific and practical task, because the basis of the digital economy system is the network subsystem. The aim is to develop a descriptive model of network security incidents. To achieve the goal, the author solves particular problems: determining security requirements and trust in the digital economy system; analysis of a typical model of network interaction in the digital economy system; description of the life cycle of security incidents and an analysis of the association of the incident with the risks. The result of the study is&amp;nbsp;the creation of a card of typical network security incidents, which the author suggests using in the process of managing security incidents, at the stage of their identification and prevention.</p></abstract><trans-abstract xml:lang="en"><p>The modern period of development is closely related to the digital transformation of various industries and the implementation of the Digital Economy program in the Russian Federation. One of the factors for the successful implementation and effective development of such a sociotechnical system is ensuring the cybersecurity of objects and entities in the processes of processing and transmitting information, and obtaining digital services. The study of the problems of ensuring its security is an important scientific and practical task, because the basis of the digital economy system is the network subsystem. The aim is to develop a descriptive model of network security incidents. To achieve the goal, the author solves particular problems: determining security requirements and trust in the digital economy system; analysis of a typical model of network interaction in the digital economy system; description of the life cycle of security incidents and an analysis of the association of the incident with the risks. The result of the study is&amp;nbsp;the creation of a card of typical network security incidents, which the author suggests using in the process of managing security incidents, at the stage of their identification and prevention.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>sociotechnical system</kwd><kwd>threat</kwd><kwd>cybersecurity</kwd><kwd>security incidents</kwd><kwd>network attack</kwd></kwd-group><kwd-group xml:lang="en"><kwd>sociotechnical system</kwd><kwd>threat</kwd><kwd>cybersecurity</kwd><kwd>security incidents</kwd><kwd>network attack</kwd></kwd-group></article-meta></front><back /></article>