“Raqamli asrda axborot xavfsizligi: it texnologiyalar bilan xavfsizlikni ta’minlash yo‘llari”
DOI:
https://doi.org/10.5281/zenodo.15637996Keywords:
Axborot xavfsizligi, kiberxavfsizlik, IT texnologiyalar, sun’iy intellekt, kriptografiya, biometrik tizimlar, blokcheyn, raqamli himoya, tahdidlar, autentifikatsiya, ma’lumotlarni himoyalash, xavfsizlik strategiyalari.Abstract
Ushbu maqolada raqamli asrda axborot xavfsizligini ta’minlash masalalari yoritilgan. Globallashuv
va raqamlashtirish jarayonlari axborot resurslariga nisbatan xavf-xatarlarni kuchaytirmoqda. Shu bois, zamonaviy
IT texnologiyalar asosida samarali himoya tizimlarini yaratish dolzarb ahamiyat kasb etmoqda. Maqolada axborot
xavfsizligining asosiy tamoyillari, kiberxavfsizlik tahdidlarining turlari, shuningdek, IT vositalari yordamida tahdidlarga qarshi
kurashish strategiyalari tahlil qilinadi. Shuningdek, zamonaviy sun’iy intellekt texnologiyalarining axborot xavfsizligida
qo‘llanilishi, blokcheyn, kriptografiya, biometrik autentifikatsiya usullarining afzalliklari va qo‘llash imkoniyatlari muhokama
qilinadi. Mazkur maqola raqamli infratuzilmani himoya qilishda IT yechimlarining amaliy ahamiyatini ko‘rsatib beradi.
Axborot xavfsizligi siyosatini ishlab chiqishda kompleks yondashuv va innovatsion texnologiyalardan foydalanish zarurligi
ta’kidlanadi.
References
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.
Li, X., Zhang, Y., & Chen, H. (2019). Artificial Intelligence in Cybersecurity: A Survey. IEEE Access, 7, 153871–153902.
https://doi.org/10.1109/ACCESS.2019.2944823
Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). Wiley.
Stoll, C. (1990). The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books.
Swan, M. (2015). Blockchain: Blueprint for a New Economy. O’Reilly Media.
Zhang, Y., Wang, X., & Wang, K. (2021). Security and Privacy in Smart IoT-Based Healthcare System. IEEE Internet of
Things Journal, 8(10), 7910–7920. https://doi.org/10.1109/JIOT.2021.3055567
ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management
systems – Requirements. International Organization for Standardization.
OWASP Foundation. (2023). OWASP Top Ten Web Application Security Risks. https://owasp.org/www-project-top-ten/
NIST. (2020). Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1). National Institute of Standards
and Technology. https://www.nist.gov/cyberframework
Downloads
Published
Issue
Section
License
Copyright (c) 2025 YASHIL IQTISODIYOT VA TARAQQIYOT

This work is licensed under a Creative Commons Attribution 4.0 International License.