KIBERHUJUMLAR TURLARI VA ULARNING OLDINI OLISH STRATEGIYALARI
Qurbonaliyev G’olibjon Alisher o’g’li
Ichki Ishlar Vazirligi Akademiyasi
Keywords: Kalit so‘zlar: Kiberhujumlar, kiberxavfsizlik, phishing, ransomware, DDoS, antivirus, firewall, axborot xavfsizligi, xavfsizlik siyosati, oldini olish strategiyalari.
Abstract
Annotatsiya: Ushbu maqolada kiberhujumlarning asosiy turlari va ularga qarshi samarali oldini olish strategiyalari tahlil qilinadi. Kiberxavfsizlik sohasidagi dolzarb muammo sifatida kiberhujumlar korxonalar, davlat tashkilotlari va individual foydalanuvchilarga katta zarar yetkazmoqda. Maqolada phishing, DDoS hujumlari, ransomware, malware va boshqa keng tarqalgan kiberhujum turlari batafsil ko‘rib chiqiladi. Shuningdek, kiberhujumlarga qarshi kurashda qo‘llaniladigan texnologik, tashkiliy va huquqiy chora-tadbirlar, jumladan, xavfsizlik devorlari (firewall), antivirus dasturlari, xodimlarni o‘qitish va axborot xavfsizligini boshqarish tizimlari muhokama qilinadi. Maqola zamonaviy kiberxavfsizlik strategiyalarining samaradorligini oshirishga yo‘naltirilgan tavsiyalarni ham o‘z ichiga oladi.
References
1. Andress, J. (2014). The Basics of Hacking and Penetration Testing. Elsevier.
2. Amoroso, E. G. (2019). Cyber Attacks: Protecting National Infrastructure. Butterworth-Heinemann.
3. Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Academic Press.
4. Stallings, W. (2017). Network Security Essentials: Applications and Standards. Pearson.
5. Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company.
6. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
7. Symantec Corporation. (2022). Internet Security Threat Report.
8. Kaspersky Lab. (2023). IT Threat Evolution Q1 2023.
9. Rouse, M. (2020). What is Phishing? TechTarget. [Online] Available at: https://searchsecurity.techtarget.com/definition/phishing
10. Mitnick, K., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.
11. National Institute of Standards and Technology (NIST). (2018). Framework for Improving Critical Infrastructure Cybersecurity. Version 1.1.
12. Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). Investments in Information Security: A Real Options Perspective. Journal of Cybersecurity, 3(2), 78-89.
13. Whitman, M., & Mattord, H. (2017). Principles of Information Security. Cengage Learning.
14. Kshetri, N. (2017). Cybersecurity Strategies for Business. IT Professional, 19(2), 20-27.
15. FireEye. (2023). M-Trends Report: Cybersecurity Threats and Trends.