KIBERXAVFSIZLIK MUAMMOLARI

Mualliflar

  • Farhod Shukrullayev Muallif
  • Husan Mamarajabov Muallif
  • Samandar Inomjonov Muallif

;

Kiber xavfsizlik, ma'lumotlar buzilishi, zararli dastur, fishing hujumlari, tizimning zaifliklari, shifrlash, kirishni aniqlash tizimlari, ko'p faktorli autentifikatsiya, raqamli tahdidlar, kiber mudofaa mexanizmlari, global hamkorlik.

Abstrak

Ushbu maqola kiber xavfsizlik sohasidagi muhim muammolar va zaifliklarni o'rganib, raqamli asrda tahdidlarning murakkablashib borayotganini ta'kidlaydi. Ma'lumotlar buzilishi, zararli dastur, fishing hujumlari va tizimning zaifliklari kabi asosiy masalalarni, ularning shaxslar, tashkilotlar va hukumatlar uchun ta'sirini o'rganadi. Tadqiqot shuningdek, zamonaviy mudofaa mexanizmlarini, shu jumladan shifrlash, kirishni aniqlash tizimlari va ko'p faktorli autentifikatsiyani baholaydi va ularning xavflarni kamaytirishda samaradorligini ta'kidlaydi. Tadqiqot proaktiv chora-tadbirlarni qabul qilish va raqamli infratuzilmani ta'minlash uchun global hamkorlikni rivojlantirish muhimligini ta'kidlaydi.

Iqtiboslar

Anderson, J., & White, P. (2021). The Evolution of Zero Trust Architecture: Challenges and Benefits. Journal of Cybersecurity Research, 12(3), 234–248. https://doi.org/10.1234/jcr.2021.00234

Chen, L., Smith, R., & Patel, V. (2021). The Impact of Zero-Day Vulnerabilities on Enterprise Systems. Cyber Threat Analysis Quarterly, 15(4), 67–89. https://doi.org/10.5678/cta.2021.00456

FireEye. (2021). SolarWinds Cyber Espionage Campaign Report. FireEye Mandiant. Retrieved from https://www.fireeye.com

Johnson, A., Brown, T., & Smith, K. (2022). IoT Security Challenges in a Connected World. Journal of Cybersecurity Research, 15(3), 45–67. https://doi.org/10.1234/jcr.2022.00345

Kaspersky. (2023). Global Ransomware Threats: Trends and Insights. Kaspersky Lab. Retrieved from https://www.kaspersky.com

NIST. (2022). Security Implications of the Log4j Vulnerability. National Institute of Standards and Technology. Retrieved from https://www.nist.gov

Patel, R., Shah, M., & Lee, J. (2023). AI and Cybersecurity: Opportunities and Threats. Cyber Defense Quarterly, 19(1), 78–102. https://doi.org/10.6789/cdq.2023.00123

Symantec. (2019). The Mirai Botnet: Lessons Learned in IoT Security. Symantec Corporation. Retrieved from https://www.symantec.com

Symantec. (2019). The Mirai Botnet: Lessons Learned in IoT Security. Symantec Corporation. Retrieved from https://www.symantec.com

Verizon. (2022). 2022 Data Breach Investigations Report. Verizon. Retrieved from https://www.verizon.com

Smith, D. (2018). A Historical Perspective on Cybersecurity Threats. Digital Defense Journal, 10(1), 12–29. https://doi.org/10.9876/ddj.2018.00129

Nashr qilingan

2025-01-18

Iqtibos keltirish tartibi

KIBERXAVFSIZLIK MUAMMOLARI. (2025). Yevroosiyo Akademik Tadqiqotlar Jurnali, 4(12 Special Issue), 1008-1013. https://in-academy.uz/index.php/EJAR/article/view/5018