BULUTLI TEXNOLOGIYALAR VA KIBERXAVFSIZLIK: XAVFLARNI BARTARAF ETISH USULLARI

Main Article Content

Abstract:

This article analyzes the complex interplay between cloud technologies and cybersecurity. While highlighting the advantages of using cloud services, it also addresses the risks associated with data insecurity, misconfiguration, and human error. The article details various methods for securing cloud infrastructure, including data encryption, access control, firewalls, and intrusion detection systems. Furthermore, it emphasizes the importance of employee training and the implementation of security policies. The article provides practical recommendations for the secure use of cloud technologies and aids in developing a strategy for protection against cyberattacks. It thoroughly describes threat types and mitigation methods, as well as the importance of regular software updates and security audits. The structure of the article follows a logical progression, moving from identifying vulnerabilities to outlining preventative measures and best practices.

Article Details

How to Cite:

Djurayeva, S., & Sadullaeva, M. (2025). BULUTLI TEXNOLOGIYALAR VA KIBERXAVFSIZLIK: XAVFLARNI BARTARAF ETISH USULLARI. Eurasian Journal of Academic Research, 4(12 Special Issue), 1023–1029. Retrieved from https://www.in-academy.uz/index.php/ejar/article/view/45839

References:

Akhundov, S. R. (2020). Bulutli texnologiyalar va ularning xavfsizlikni ta’minlashdagi roli. Tashkent: IT Press.

Aliyev, M. R. (2021). Shifrlash algoritmlari va ularning kiberxavfsizlikda qo‘llanilishi. Journal of Information Security, 15(4), 25-34.

Davlatov, R., & Khasanov, M. (2022). Tarmoq xavfsizligi: tahdidlarni aniqlash tizimlari. Computer Science & Technologies, 12(1), 45-56.

International Organization for Standardization (ISO/IEC 27001:2013). (2013). Information technology – Security techniques – Information security management systems – Requirements. Geneva: ISO.

Zaynalov, T. S., & Olimov, F. R. (2020). Kiberxavfsizlik va raqamli valyutalar: yangi tahdidlar va xavflar. Cybersecurity in Digital Economy, 8(2), 98-106.

Shamsiev, D., & Qodirov, S. (2021). Ko‘p bosqichli autentifikatsiya tizimlari va ularning xavfsizlikni ta’minlashdagi o‘rni. Journal of Cybersecurity Research, 10(3), 134-142.

Cybersecurity and Infrastructure Security Agency (CISA). (2022). Cybersecurity and Critical Infrastructure Security. Available at: https://www.cisa.gov

Nabiyev, A. M., & Mustafayev, K. Z. (2020). Bulutli texnologiyalarda xavfsizlikni ta’minlash va kiberhujumlarga qarshi kurashish. International Journal of Cloud Computing, 7(1), 12-19.

National Institute of Standards and Technology (NIST). (2018). Framework for Improving Critical Infrastructure Cybersecurity. NIST Special Publication 800-53. Gaithersburg, MD: NIST.

Stoyanov, I. V. (2021). Shifrlash va autentifikatsiya: nazariy va amaliy yondashuvlar. Journal of Information Security, 17(5), 50-60.

Rafikov, J., & Mamatov, I. (2021). Informatika va axborot texnologiyalari fanida ta’lim va xavfsizlikni boshqarish. Tashkent: TATU.

Kasimov, A. S. (2020). ISO/IEC 27001 standarti va uni amalga oshirishda ko‘rilgan usullar. Journal of Cybersecurity Education, 6(3), 15-22.

Uzbekistan Republic Ministry of Information Technologies and Communications. (2021). National Cybersecurity Strategy of the Republic of Uzbekistan. Tashkent: Ministry of ITC.

Khurshidov, A. K., & O‘rmonov, B. A. (2020). Yangi kiberxavfsizlik strategiyalari va ularga doir ilg‘or yondashuvlar. Journal of Computing and Network Security, 14(2), 72-81.

Aliev, T. S. (2020). Internetda xavfsizlikni ta’minlashning zamonaviy metodlari. Information Security Review, 9(1), 87-95.

Baryshov, P. Y. (2022). Tarmoq xavfsizligini boshqarish va eng yaxshi amaliyotlar. International Journal of Network Security, 16(4), 150-158.

Shokirov, B. A. (2021). Kiberhujumlar va ularga qarshi kurashishda yangi texnologiyalar. Cybersecurity Advances, 5(3), 67-75.

Bektemirov, F. R. (2020). Raqamli xavfsizlik: tahdidlar va himoya vositalari. Journal of Information Protection, 11(2), 33-42.

O‘rmonov, B., & Yusupov, A. (2022). Shifrlash tizimlarining xavfsizlikni oshirishdagi o‘rni. International Journal of Information Technologies, 13(4), 12-20.

Internet Society (ISOC). (2022). The Role of Encryption in Security. Available at: https://www.internetsociety.org