KIBEROLAM: MILLIY XAVFSIZLIKNING YANGI FRONTI
Abstract
Ushbu maqolada zamonaviy kiberxavfsizlik tahdidlari va ularning milliy xavfsizlik tizimiga ta’siri chuqur tahlil qilinadi. Asarda APT (Advanced Persistent Threat) guruhlarining faoliyati, F-35 texnologik o‘g‘irligi misolida kiberurushlarning global oqibatlari, hamda O‘zbekiston Respublikasida kiberxavfsizlik sohasida amalga oshirilayotgan islohotlar ilmiy asosda yoritilgan. Muallif tomonidan taklif etilgan “Milliy Kiberbarqarorlik va Raqamli Suverenitet Modeli (MKRM)” texnologik, iqtisodiy va ijtimoiy omillarni uyg‘unlashtirgan holda milliy kiberxavfsizlik tizimini mustahkamlashga qaratilgan.
References
1.Mandiant. APT1: Exposing One of China’s Cyber Espionage Units. February 2013. Accessed November 7, 2025. https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units.
2. Cybersecurity and Infrastructure Security Agency (CISA). “SVR Cyber Actors Adapt Tactics for Initial Cloud Access.” February 26, 2024. Accessed November 7, 2025. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-057a.
3. Ralph Langner, “Iran: Computer Malware Sabotaged Uranium Centrifuges,” Wired, November 29, 2010, accessed November 7, 2025, https://www.wired.com/2010/11/stuxnet-sabotage-centrifuges/.
4. Geoff Brumfiel, “Suspected Russian hackers spied on US federal agencies,” The Guardian, December 14, 2020, accessed November 7, 2025, https://www.theguardian.com/world/2020/dec/14/suspected-russian-hackers-spied-on-us-federal-agencies.
5.U.S. Cybersecurity & Infrastructure Security Agency (CISA), “Cyber‑Attack Against Ukrainian Critical Infrastructure: Alert (IR‑ALERT‑H‑16‑056‑01),” accessed November 7, 2025, https://www.cisa.gov/ics/alerts/IR-ALERT-H-16-056-01.
6. Reuters. “Joint Strike Fighter plans stolen in Australia cyber attack.” Reuters, October 11, 2017. Accessed November 7, 2025. https://www.reuters.com/article/technology/joint-strike-fighter-plans-stolen-in-australia-cyber-attack-idUSKBN1CH008.
7. Asian Times. “PLA’s J‑20 fighters use stolen US tech: report.” Asia Times, October 21, 2019. Accessed November 7, 2025. https://asiatimes.com/2019/10/plas-j-20-fighters-use-stolen-us-tech-report/.
8. U.S. Government Accountability Office (GAO), F‑35 Sustainment: Costs Continue to Rise While Planned Actions Could Reduce Some Long‑Term Costs, GAO‑24‑106703, April 15, 2024, accessed November 7, 2025, https://www.gao.gov/products/gao-24-106703.
9. Jeffrey Gertler, F‑35 Joint Strike Fighter (JSF) Program: Background, Status, and Issues, Congressional Research Service report RL30563, February 16, 2012, accessed November 7, 2025, https://www.everycrsreport.com/files/20120216_RL30563_d64afecc9e8d4b2069afb19013104a4bb7de5eec.pdf.
10. Derek S. Reveron and John R. Deni (eds.), Confronting China’s Efforts to Steal Defense Information, Belfer Center, May 4, 2020, accessed November 7, 2025, https://www.belfercenter.org/publication/confronting-chinas-efforts-steal-defense-information.
11. World Intellectual Property Organization, IP Facts and Figures 2023 (Geneva: WIPO, 2023), accessed November 7, 2025, https://www.wipo.int/edocs/pubdocs/en/wipo%E2%80%91pub%E2%80%91943%E2%80%912023%E2%80%91en%E2%80%91wipo%E2%80%91ip%E2%80%91facts%E2%80%91and%E2%80%91figures%E2%80%912023.pdf
12. National Institute of Standards and Technology, Zero Trust Architecture, Special Publication 800‑207 (Gaithersburg, MD: NIST, August 2020), accessed November 7, 2025, https://www.nist.gov/publications/zero-trust-architecture.
13. O‘zbekiston Respublikasi Oliy Majlisi Qonunchilik palatasi, “Kiberxavfsizlik to‘g‘risida”gi Qonun, O‘RQ‑764‑son, 15 aprel 2022, accessed November 7, 2025, https://lex.uz/docs/-5960604.
14. O‘zbekiston Respublikasi Oliy Majlisi Qonunchilik palatasi, “Kiberxavfsizlikni ta’minlash sohasidagi …”gi Qonun, O‘RQ‑964‑son, 20 sentabr 2024, accessed November 7, 2025, https://lex.uz/uz/docs/-7108720.
15. O‘zbekiston Respublikasi Prezidentining, “Axborot texnologiyalari yordamida sodir etiladigan jinoyatlarga qarshi kurashish faoliyatini yanada kuchaytirishga qaratilgan chora‑tadbirlar to‘g‘risida”gi PQ‑153‑son qaror, 30 aprel 2025, accessed November 7, 2025, https://lex.uz/ru/docs/-7511145
16. “Launch of UZSOC: Cyber Threat Monitoring and Management System”, UZINFOCOM (Toshkent: 2 Avgust 2024), accessed November 7 2025, https://uzinfocom.uz/en/projects/uzsoc-ru-29.
17. International Telecommunication Union, Global Cybersecurity Index 2024 (GCI 5th Edition) (Geneva: ITU, September 12, 2024), accessed November 7, 2025, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/2401416_1b_Global-Cybersecurity-Index-E.pdf.
18. Cybersecurity Centre of the Republic of Uzbekistan, “Over 12 million cyber‑attack attempts in Uzbekistan in 2024,” AKIpress News Agency, February 4, 2025, accessed November 7, 2025, https://www.akipress.com/news/817364.html.
19. Gazeta.uz, “Cybercrimes in Uzbekistan increase 68‑fold in five years,” May 31, 2025, accessed November 7, 2025, https://www.gazeta.uz/en/2025/05/31/cybercrime/
20. Ministry of Internal Affairs of the Republic of Uzbekistan, “Cybercrimes in Uzbekistan rise 68‑fold: Nearly 2 trillion UZS stolen in five years,” Kun.uz, May 29, 2025, accessed November 7, 2025,
21. Sh. A. Gafurov, “Statistical Analysis of the ‘.UZ’ Domain of the Internet Network,” Conferencea (2024: 30th Tech‑Fest: USA September), published September 19, 2024, accessed November 7 2025, https://conferencea.org/index.php/conferences/article/view/3515









