“Raqamli asrda axborot xavfsizligi: it texnologiyalar bilan xavfsizlikni ta’minlash yo‘llari”
DOI:
https://doi.org/10.5281/zenodo.15637996Ключевые слова:
Axborot xavfsizligi, kiberxavfsizlik, IT texnologiyalar, sun’iy intellekt, kriptografiya, biometrik tizimlar, blokcheyn, raqamli himoya, tahdidlar, autentifikatsiya, ma’lumotlarni himoyalash, xavfsizlik strategiyalari.Аннотация
Ushbu maqolada raqamli asrda axborot xavfsizligini ta’minlash masalalari yoritilgan. Globallashuv
va raqamlashtirish jarayonlari axborot resurslariga nisbatan xavf-xatarlarni kuchaytirmoqda. Shu bois, zamonaviy
IT texnologiyalar asosida samarali himoya tizimlarini yaratish dolzarb ahamiyat kasb etmoqda. Maqolada axborot
xavfsizligining asosiy tamoyillari, kiberxavfsizlik tahdidlarining turlari, shuningdek, IT vositalari yordamida tahdidlarga qarshi
kurashish strategiyalari tahlil qilinadi. Shuningdek, zamonaviy sun’iy intellekt texnologiyalarining axborot xavfsizligida
qo‘llanilishi, blokcheyn, kriptografiya, biometrik autentifikatsiya usullarining afzalliklari va qo‘llash imkoniyatlari muhokama
qilinadi. Mazkur maqola raqamli infratuzilmani himoya qilishda IT yechimlarining amaliy ahamiyatini ko‘rsatib beradi.
Axborot xavfsizligi siyosatini ishlab chiqishda kompleks yondashuv va innovatsion texnologiyalardan foydalanish zarurligi
ta’kidlanadi.
Библиографические ссылки
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.
Li, X., Zhang, Y., & Chen, H. (2019). Artificial Intelligence in Cybersecurity: A Survey. IEEE Access, 7, 153871–153902.
https://doi.org/10.1109/ACCESS.2019.2944823
Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). Wiley.
Stoll, C. (1990). The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books.
Swan, M. (2015). Blockchain: Blueprint for a New Economy. O’Reilly Media.
Zhang, Y., Wang, X., & Wang, K. (2021). Security and Privacy in Smart IoT-Based Healthcare System. IEEE Internet of
Things Journal, 8(10), 7910–7920. https://doi.org/10.1109/JIOT.2021.3055567
ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management
systems – Requirements. International Organization for Standardization.
OWASP Foundation. (2023). OWASP Top Ten Web Application Security Risks. https://owasp.org/www-project-top-ten/
NIST. (2020). Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1). National Institute of Standards
and Technology. https://www.nist.gov/cyberframework
Загрузки
Опубликован
Как цитировать
Выпуск
Раздел
Лицензия
Copyright (c) 2025 YASHIL IQTISODIYOT VA TARAQQIYOT

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.