XODIMLARNING KIBERXAVFSIZLIK SAVODXONLIGINI OSHIRISH ORQALI ICHKI HUJUMLARNI KAMAYTIRISH STRATEGIYASI

Authors

  • Ilg‘orova Dilnoza Ilg‘or qizi Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti Nurafshon filiali, talabasi Author

Keywords:

Ichki tahdidlar, insayder hujumlar, kiberxavfsizlik savodxonligi, psixologik monitoring,User Behavior Analytics (UBA), SIEM, DLP, xavf profilaktikasi, strategik yondashuv..

Abstract

Mazkur ilmiy ishda tashkilotlarda ichki tahdidlarni kamaytirishning strategik usullari sifatida xodimlarning kiberxavfsizlik savodxonligini oshirish muhim omil sifatida ko‘rib chiqiladi. Tadqiqot davomida insayder hujumlarning psixologik va xulqiy sabablari tahlil qilinib, xodim xatti-harakatlarini baholovchi zamonaviy texnologiyalar – User Behavior Analytics (UBA), SIEM va DLP tizimlari, shuningdek, mashina o‘rganish asosidagi modellar tahlil qilinadi. Shuningdek, xavfsizlik siyosatiga psixologik monitoring elementlarini integratsiya qilish, xavfsizlik madaniyatini shakllantirish va xodimlarga yo‘naltirilgan xavfsizlik yondashuvlari bo‘yicha amaliy tavsiyalar ishlab chiqilgan. Natijada, ichki tahdidlarni erta aniqlash va samarali boshqarish uchun texnologik va insoniy omillar uyg‘unligiga asoslangan kompleks yondashuv asoslab beriladi.

References

[1] Vaidya, R. (2019). Cyber Security Breaches Survey 2019. Department for Digital, Culture, Media & Sport, GOV.UK.

[2] Greitzer, F.L. & Frincke, D.A. (2010). Combining traditional cyber security audit data with psychosocial data: Towards predictive modeling for insider threat mitigation. In Insider Threats in Cyber Security. Springer.

[3] Shaw, E.D., Ruby, K.G., & Post, J.M. (1999). The Insider Threat to Information Systems: The Psychology of the Dangerous Insider. Security Awareness Bulletin.

[4] CERT Insider Threat Center. (2017). Common Sense Guide to Mitigating Insider Threats (5th ed.). Carnegie Mellon University.

[5] Caltagirone, S., Pendergast, A., & Betz, C. (2013). The Diamond Model of Intrusion Analysis. Center for Cyber Intelligence Analysis and Threat Research.

Downloads

Published

2025-06-01