“Raqamli asrda axborot xavfsizligi: it texnologiyalar bilan xavfsizlikni ta’minlash yo‘llari”

“Raqamli asrda axborot xavfsizligi: it texnologiyalar bilan xavfsizlikni ta’minlash yo‘llari”

Authors

  • Sherzod Rajabov

DOI:

https://doi.org/10.5281/zenodo.15637996

Keywords:

Axborot xavfsizligi, kiberxavfsizlik, IT texnologiyalar, sun’iy intellekt, kriptografiya, biometrik tizimlar, blokcheyn, raqamli himoya, tahdidlar, autentifikatsiya, ma’lumotlarni himoyalash, xavfsizlik strategiyalari.

Abstract

Ushbu maqolada raqamli asrda axborot xavfsizligini ta’minlash masalalari yoritilgan. Globallashuv
va raqamlashtirish jarayonlari axborot resurslariga nisbatan xavf-xatarlarni kuchaytirmoqda. Shu bois, zamonaviy
IT texnologiyalar asosida samarali himoya tizimlarini yaratish dolzarb ahamiyat kasb etmoqda. Maqolada axborot
xavfsizligining asosiy tamoyillari, kiberxavfsizlik tahdidlarining turlari, shuningdek, IT vositalari yordamida tahdidlarga qarshi
kurashish strategiyalari tahlil qilinadi. Shuningdek, zamonaviy sun’iy intellekt texnologiyalarining axborot xavfsizligida
qo‘llanilishi, blokcheyn, kriptografiya, biometrik autentifikatsiya usullarining afzalliklari va qo‘llash imkoniyatlari muhokama
qilinadi. Mazkur maqola raqamli infratuzilmani himoya qilishda IT yechimlarining amaliy ahamiyatini ko‘rsatib beradi.
Axborot xavfsizligi siyosatini ishlab chiqishda kompleks yondashuv va innovatsion texnologiyalardan foydalanish zarurligi
ta’kidlanadi.

Author Biography

Sherzod Rajabov


Xalqaro Nordik universiteti
Sanoatni boshqarish va raqamli texnologiyalar
kafedrasi dotsenti

References

Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.

Li, X., Zhang, Y., & Chen, H. (2019). Artificial Intelligence in Cybersecurity: A Survey. IEEE Access, 7, 153871–153902.

https://doi.org/10.1109/ACCESS.2019.2944823

Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.

Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf

Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). Wiley.

Stoll, C. (1990). The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books.

Swan, M. (2015). Blockchain: Blueprint for a New Economy. O’Reilly Media.

Zhang, Y., Wang, X., & Wang, K. (2021). Security and Privacy in Smart IoT-Based Healthcare System. IEEE Internet of

Things Journal, 8(10), 7910–7920. https://doi.org/10.1109/JIOT.2021.3055567

ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management

systems – Requirements. International Organization for Standardization.

OWASP Foundation. (2023). OWASP Top Ten Web Application Security Risks. https://owasp.org/www-project-top-ten/

NIST. (2020). Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1). National Institute of Standards

and Technology. https://www.nist.gov/cyberframework

Downloads

Published

2025-05-01
Loading...