KIBERXAVFSIZLIK MUAMMOLARI

Authors

  • Farhod Shukrullayev Author
  • Husan Mamarajabov Author
  • Samandar Inomjonov Author

Keywords:

Kiber xavfsizlik, ma'lumotlar buzilishi, zararli dastur, fishing hujumlari, tizimning zaifliklari, shifrlash, kirishni aniqlash tizimlari, ko'p faktorli autentifikatsiya, raqamli tahdidlar, kiber mudofaa mexanizmlari, global hamkorlik.

Abstract

Ushbu maqola kiber xavfsizlik sohasidagi muhim muammolar va zaifliklarni o'rganib, raqamli asrda tahdidlarning murakkablashib borayotganini ta'kidlaydi. Ma'lumotlar buzilishi, zararli dastur, fishing hujumlari va tizimning zaifliklari kabi asosiy masalalarni, ularning shaxslar, tashkilotlar va hukumatlar uchun ta'sirini o'rganadi. Tadqiqot shuningdek, zamonaviy mudofaa mexanizmlarini, shu jumladan shifrlash, kirishni aniqlash tizimlari va ko'p faktorli autentifikatsiyani baholaydi va ularning xavflarni kamaytirishda samaradorligini ta'kidlaydi. Tadqiqot proaktiv chora-tadbirlarni qabul qilish va raqamli infratuzilmani ta'minlash uchun global hamkorlikni rivojlantirish muhimligini ta'kidlaydi.

References

Anderson, J., & White, P. (2021). The Evolution of Zero Trust Architecture: Challenges and Benefits. Journal of Cybersecurity Research, 12(3), 234–248. https://doi.org/10.1234/jcr.2021.00234

Chen, L., Smith, R., & Patel, V. (2021). The Impact of Zero-Day Vulnerabilities on Enterprise Systems. Cyber Threat Analysis Quarterly, 15(4), 67–89. https://doi.org/10.5678/cta.2021.00456

FireEye. (2021). SolarWinds Cyber Espionage Campaign Report. FireEye Mandiant. Retrieved from https://www.fireeye.com

Johnson, A., Brown, T., & Smith, K. (2022). IoT Security Challenges in a Connected World. Journal of Cybersecurity Research, 15(3), 45–67. https://doi.org/10.1234/jcr.2022.00345

Kaspersky. (2023). Global Ransomware Threats: Trends and Insights. Kaspersky Lab. Retrieved from https://www.kaspersky.com

NIST. (2022). Security Implications of the Log4j Vulnerability. National Institute of Standards and Technology. Retrieved from https://www.nist.gov

Patel, R., Shah, M., & Lee, J. (2023). AI and Cybersecurity: Opportunities and Threats. Cyber Defense Quarterly, 19(1), 78–102. https://doi.org/10.6789/cdq.2023.00123

Symantec. (2019). The Mirai Botnet: Lessons Learned in IoT Security. Symantec Corporation. Retrieved from https://www.symantec.com

Symantec. (2019). The Mirai Botnet: Lessons Learned in IoT Security. Symantec Corporation. Retrieved from https://www.symantec.com

Verizon. (2022). 2022 Data Breach Investigations Report. Verizon. Retrieved from https://www.verizon.com

Smith, D. (2018). A Historical Perspective on Cybersecurity Threats. Digital Defense Journal, 10(1), 12–29. https://doi.org/10.9876/ddj.2018.00129

Published

2025-01-18

How to Cite

KIBERXAVFSIZLIK MUAMMOLARI. (2025). Eurasian Journal of Academic Research, 4(12 Special Issue), 1008-1013. https://in-academy.uz/index.php/EJAR/article/view/5018