ZAMONAVIY TASHKILOTLARDA KIBERXAVFSIZLIK STRATEGIYALARINING SHAKLLANISHI VA SAMARADORLIGI: MAʼLUMOTLARNI HIMOYA QILISH CHORALARINING RIVOJLANISHI VA NATIJADORLIGI TAHLILI
Kalit so'zlar
https://doi.org/10.47390/SPR1342V5SI1Y2025N60Kalit so'zlar
Kiberxavfsizlik, Sunʼiy intellekt, Mashinaviy oʻrganish, Xalqaro siyosatlar, Inson omili, Kiber tahdidlarAnnotasiya
Bugungi kunda kiber tahdidlar yanada murakkablashib borayotganligi sababli, zamonaviy tashkilotlarda kiberxavfsizlik strategiyalarining rivojlanishi va samaradorligini oʻrganish muhim ahamiyat kasb etadi. Ushbu tadqiqot anʼanaviy usullardan zamonaviy, texnologiyaga asoslangan yondashuvlarga oʻtish jarayonini tahlil qiladi. Raqamli texnologiyalarning rivojlanishi kiberxavfsizlik choralarini mustahkamlashni talab etmoqda. Tadqiqotda kiberxavfsizlik strategiyalarining tarixiy taraqqiyoti, zamonaviy tendensiyalar va kelajakdagi yoʻnalishlari oʻrganiladi. Shuningdek, sunʼiy intellekt (AI) va mashinaviy oʻrganish (ML) texnologiyalarining roli, xalqaro siyosatlarning taʼsiri hamda inson omilining ahamiyati tahlil qilinadi.
Manbalar
1. Akyesilmen N. Türkiye in the global cybersecurity arena: strategies in theory and practice. Insight Turkey/Summer 2022: Embracing Emerging Technologies, 2022. P - 109. DOI: https://doi.org/10.25253/99.2022243.8
2. Alrubaiq A., & Alharbi T. Developing a cybersecurity framework for e-government project in the Kingdom of Saudi Arabia. Journal of Cybersecurity and Privacy, 2021. 1(2), P - 302-318. DOI: https://doi.org/10.3390/JCP1020017
3. Antunes M., Maximiano, M., Gomes R., & Pinto D. Information security and
cybersecurity management: a case study with SMEs in Portugal. Journal of Cybersecurity and Privacy, 2021. 1(2), P - 219-238. DOI: https://doi.org/10.3390/JCP1020012
4. Bobric G.-D. Study regarding the cyber threats to the national security. Scientific BulletinNicolae Balcescu Land Forces Academy, 2020. 25(1), P - 18-25. DOI: https://doi.org/10.2478/bsaft-2020-0003
5. Cheng E. C. K., & Wang T. Institutional strategies for cybersecurity in higher education institutions. Information,2022. 13(4), P-192. DOI: https://doi.org/10.3390/info13040192
6. George H., & Arnett A. Implementing Cybersecurity Best Practices for Electrical Infrastructure in a Refinery: A Case Study. IEEE Industry Applications Magazine, 2021. 27(4), P - 18-24. DOI: https://doi.org/10.1109/MIAS.2021.3063095
7. Malik A. A., & Tosh D. K. Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020. P - 1-6. IEEE. DOI:
https://doi.org/10.1109/ICCCN49398.2020.9209654
8. Nobles C. (2018). The cyber talent gap and cybersecurity professionalizing. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), P - 42-51. DOI: https://doi.org/10.4018/IJHIOT.2018010104
9. Nugraha A.C., Hidayanto A.N., Indriany H.S., Kurniati H., & Firdaus B.M.A.
Cybersecurity project implementation for resources protection: a case study of the National Narcotics Board. In IOP Conference Series: Earth and Environmental Science, 2022 (Vol. 969, No. 1, p. 012061). IOP Publishing. DOI: https://doi.org/10.1088/1755-1315/969/1/012061
10. Sharma, R.C., & Zamfiroiu, A. Cybersecurity Threats and Vulnerabilities in the Metaverse. In 2023 International Conference on Intelligent Metaverse Technologies & Applications(iMETA), 2023 P - 1-7. DOI: https://doi.org/10.1109/iMETA59369.2023.10294950
11. Shim S. The development of digital technologies and cyber security threats. State and Politics, 2023. 29(1), P - 197-238. DOI: https://doi.org/10.56022/ceas.2023.29.1.197
12. Sia N. C., Hosseinian-Far A., & Toe T. T. Reasons Behind Poor Cybersecurity Readiness of Singapore’s Small Organizations: Reveal by Case Studies. In Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 P - 269-283. Cham: Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-68534-8_17
13. Tanriverdiyev, E. The state of the cyber environment and national cybersecurity strategy in developed countries. Studia Bezpieczeństwa Narodowego, 2022. - 23(1), P - 19-26. DOI: https://doi.org/10.37055/sbn/149510
14. Varma, P., Nijjer, S., Kaur, B., & Sharma, S. Blockchain for transformation in digital marketing. In Handbook of Research on the Platform Economy and the Evolution of ECommerce, 2022. P - 274-298. IGI Global. DOI: https://doi.org/10.4018/978-1-7998-7545-1.ch012