RAQAMLI IQTISODIYOT TIZIMIGA BO‘LADIGAN HUJUMLAR TAHLILI

Authors

  • Tadjiyeva Malika Murotovna Author

Keywords:

Kalit so‘zlar:raqamli iqtisodiyot; kiberxavfsizlik; DDoS; phishing; ransomware; credential stuffing; API xavfsizligi; bulut konfiguratsiyasi xatolari; IAM; Zero Trust; MFA/FIDO2; SIEM; ELK; IoT botnetlar.

Abstract

Annotatsiya:Ushbu  maqolada  raqamli  iqtisodiyot  infratuzilmasiga  nisbatan 
keng tarqalgan kiberhujumlar - DDoS, phishing, ransomware, credential stuffing, API 
suiste’moli  va  bulut  konfiguratsiyasi  xatolari  -  ning  mohiyati,  ta’sir  doirasi  va 
evolyutsiyasi tizimli tahlil qilinadi. ENISA (2024), Verizon DBIR (2024), IBM (2024) 
va boshqa manbalar asosida bank/to‘lov tizimlari, davlat resurslari hamda e-commerce 
sektorlarida  xatarlar  profilining  farqlari  ko‘rsatiladi.  Shuningdek,  ko‘p  bosqichli 
mudofaa modeli doirasida texnik (AES, ECC, Ascon; MFA/FIDO2; WAF, IDS/IPS; 
DDoS mitigatsiya), tashkiliy (siyosatlar, treninglar, ta’minot zanjiri auditi) va analitik 
(SIEM,  ELK,  AI-asosli  monitoring)  choralarining  integratsiyalashgan  qo‘llanishi 
samaradorligi  asoslanadi.  Natijalar  shuni  ko‘rsatadiki,  sektorga  xos  xavf  profiliga 
moslashtirilgan  va  me’yoriy  talablar  bilan  uyg‘unlashgan  kompleks  yondashuv 
barqarorlik,  uzluksizlik  va  foydalanuvchi  ishonchini  ta’minlashda  hal  qiluvchi 
ahamiyat kasb etadi. 

References

1. ENISA. (2024). ENISA Threat Landscape 2023/2024. European Union Agency for

Cybersecurity. https://www.enisa.europa.eu/publications

2. Verizon. (2024). 2024 Data Breach Investigations Report (DBIR).

https://www.verizon.com/business/resources/reports/dbir/

3. IBM Security, & Ponemon Institute. (2024). Cost of a data breach report 2024. IBM.

https://www.ibm.com/reports/data-breach

4. Microsoft. (2024). Digital Defense Report 2024.

https://www.microsoft.com/digitaldefense

5. FireEye/Mandiant. (2024). M-Trends 2024: Insights into today’s threat landscape.

https://www.mandiant.com/resources/m-trends

6. International Organization for Standardization. (2022). ISO/IEC 27001:2022 —

Information security, cybersecurity and privacy protection — Information security

management systems — Requirements. ISO.

7. National Institute of Standards and Technology. (2020). Zero Trust architecture (SP

800-207). https://doi.org/10.6028/NIST.SP.800-207

8. National Institute of Standards and Technology. (2023). Lightweight cryptography:

Announcement of selected algorithms (Ascon).

https://csrc.nist.gov/projects/lightweight-cryptography

9. National Institute of Standards and Technology. (2024). Cybersecurity Framework

(CSF) 2.0. https://www.nist.gov/cyberframework

10. OWASP. (2021). OWASP Top 10: 2021. OWASP Foundation. https://owasp.org

11. OWASP. (2023). API Security Top 10: 2023. OWASP Foundation.

https://owasp.org

12. Kaspersky Lab. (2023). Kaspersky Security Bulletin 2023: Statistics & trends.

https://www.kaspersky.com

13. Cloudflare. (2024). DDoS threat report 2024 (Year in Review).

https://www.cloudflare.com/learning/ddos/

Published

2025-09-09

How to Cite

Tadjiyeva Malika Murotovna. (2025). RAQAMLI IQTISODIYOT TIZIMIGA BO‘LADIGAN HUJUMLAR TAHLILI . TADQIQOTLAR, 69(1), 390-400. https://journalss.org/index.php/tad/article/view/661