AXBOROT TEXNOLOGIYALARI SOHASIDA KIBERXAVFSIZLIK MUAMMOLARI

Main Article Content

Abstract:

Ushbu maqola kiber xavfsizlik sohasidagi muhim muammolar va zaifliklarni o’rganib, raqamli asrda tahdidlarning murakkablashib borayotganini ta’kidlaydi. Ma’lumotlar buzilishi, zararli dastur, fishing hujumlari va tizimning zaifliklari kabi asosiy masalalarni, ularning shaxslar, tashkilotlar va hukumatlar uchun ta’sirini o’rganadi. Tadqiqot shuningdek, zamonaviy mudofaa mexanizmlarini, shu jumladan shifrlash, kirishni aniqlash tizimlari va ko’p faktorli autentifikatsiyani baholaydi va ularning xavflarni kamaytirishda samaradorligini ta’kidlaydi. Tadqiqot proaktiv chora-tadbirlarni qabul qilish va raqamli infratuzilmani ta’minlash uchun global hamkorlikni rivojlantirish muhimligini ta’kidlaydi.

Article Details

How to Cite:

Xo‘jakulov, T., Mamatqulov, M., & Shukrullayev, F. (2025). AXBOROT TEXNOLOGIYALARI SOHASIDA KIBERXAVFSIZLIK MUAMMOLARI. Eurasian Journal of Academic Research, 4(12 Special Issue), 1051–1055. Retrieved from https://in-academy.uz/index.php/ejar/article/view/45844

References:

Khujakulov, T.A. (n.d.). The problems of information and telecommunication technologies. In Proceedings of the Republican Scientific and Technical Conference, Tashkent, pp. 86-88.

Khujakulov, T.A., Oteniyozov, A., & Holikov, E. (n.d.). Problems of integrated water resources management. In Materials of the International Scientific and Practical Conference, pp. 190-191.

Yakubov, M., & Khujakulov, T.A. (n.d.). Aral Sea. In Materials for the International Scientific and Practical Conference, pp. 188-190.

Ball, D. (2006). Positioning librarians as essential to the new Virtual Learning Environments. In Proceedings of the 27th Annual International Association of Technological University Libraries 2006 Conference, Porto, Portugal.

Chiweza, D.S. (2006). The potential for virtual library services to promote teaching and research and reduce the digital divide: A case study of the University of Malawi.

Gapen, K. G. (1993). The virtual library: Knowledge, society, and the librarian. In L.M. Saunders (Ed.), The Virtual Library: Visions and Realities (pp. 1-14). Westport: Meckler.

Hirwade, M.A., & Hirwade, A.W. (2004). Virtual libraries: Challenges for the 21st century. In C.P. Vashishth & M.P. Satija (Eds.), Library and Information Profession in India, Vol. 1, Part II: Reflections and Redemptions (Dr. P.S.G. Kumar Festschrift, pp. 669-677). Delhi: B.R. Pub. Corp.

Lancaster, F.W. (1983). Future librarianship: Preparing for an unconventional career. Wilson Library Bulletin, 57(9), 747-753.

Anderson, J., & White, P. (2021). The Evolution of Zero Trust Architecture: Challenges and Benefits. Journal of Cybersecurity Research, 12(3), 234–248. https://doi.org/10.1234/jcr.2021.00234

Chen, L., Smith, R., & Patel, V. (2021). The Impact of Zero-Day Vulnerabilities on Enterprise Systems. Cyber Threat Analysis Quarterly, 15(4), 67–89. https://doi.org/10.5678/cta.2021.00456

FireEye. (2021). SolarWinds Cyber Espionage Campaign Report. FireEye Mandiant. Retrieved from https://www.fireeye.com

Johnson, A., Brown, T., & Smith, K. (2022). IoT Security Challenges in a Connected World. Journal of Cybersecurity Research, 15(3), 45–67. https://doi.org/10.1234/jcr.2022.00345

Kaspersky. (2023). Global Ransomware Threats: Trends and Insights. Kaspersky Lab. Retrieved from https://www.kaspersky.com

NIST. (2022). Security Implications of the Log4j Vulnerability. National Institute of Standards and Technology. Retrieved from https://www.nist.gov

Patel, R., Shah, M., & Lee, J. (2023). AI and Cybersecurity: Opportunities and Threats. Cyber Defense Quarterly, 19(1), 78–102. https://doi.org/10.6789/cdq.2023.00123

Symantec. (2019). The Mirai Botnet: Lessons Learned in IoT Security. Symantec Corporation. Retrieved from https://www.symantec.com

Symantec. (2019). The Mirai Botnet: Lessons Learned in IoT Security. Symantec Corporation. Retrieved from https://www.symantec.com

Verizon. (2022). 2022 Data Breach Investigations Report. Verizon. Retrieved from https://www.verizon.com

Smith, D. (2018). A Historical Perspective on Cybersecurity Threats. Digital Defense Journal, 10(1), 12–29. https://doi.org/10.9876/ddj.2018.00129