KIBERXAVFSIZLIK VA KIBERTERRORIZMNING KESISHISHI: MUAMMOLAR VA YECHIMLAR
PDF
DOI

Keywords

Terrorizm, kibermakon, kiberxavfsizlik, kiberhujum, virus, BMT, Axborot texnologiyalari.

How to Cite

Abdusattorov Shahzod Abdumumin o‘g‘li. (2024). KIBERXAVFSIZLIK VA KIBERTERRORIZMNING KESISHISHI: MUAMMOLAR VA YECHIMLAR. Journal of Universal Science Research, 2(6), 262–272. Retrieved from https://universalpublishings.com/index.php/jusr/article/view/6330

Abstract

Ushbu maqolada kiberjinoyatchilikning boshqa turlari va kiberterrorizmning bir-biriga ta’siri va kiberxavfsizlikni ta’minlash borasidagi qiyinchiliklar haqida tahlil qilinadi.

PDF
DOI

References

Mukekhe WG. Information System Infrastructure Management Influence On Cyber-Terrorism in Directorate of Criminal Investigation, Nairobi City County, Kenya.. 2021. ku.ac.ke

Öğün MN, Yurtsever S, Aslan M, Elburası M. Terrorist Use of Cyber Technology. Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi B-Teorik Bilimler. 2021 Dec 12;9(Iconat Special Issue 2021):113-28. dergipark.org.tr

Saul B, Heath K. Cyber terrorism and use of the internet for terrorist purposes. Research Handbook on International Law and …. 2021. [HTML]

Weiss M, Biermann F. Cyberspace and the protection of critical national infrastructure. Journal of Economic Policy Reform. 2023. [HTML]

Gilad A, Pecht E, Tishler A. Intelligence, cyberspace, and national security. Defence and Peace Economics. 2021. researchgate.net

AlDaajeh S, Saleous H, Alrabaee S, Barka E, Breitinger F, Choo KK. The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security. 2022 Aug 1;119:102754. unil.ch

Schultz Jr EE. Wednesday, May 9, 1990 10: 30 am to 10: 45 am. In13th Department of Energy Computer Security Group Conference. osti.gov

Miller T, Staves A, Maesschalck S, Sturdee M, Green B. Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems. International Journal of Critical Infrastructure Protection. 2021 Dec 1;35:100464. [HTML]

Lallie HS, Shepherd LA, Nurse JR, Erola A, Epiphaniou G, Maple C, Bellekens X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & security. 2021 Jun 1;105:102248. nih.gov

Breyer SG, Stewart RB, Sunstein CR, Vermeule A, Herz M. Administrative Law and Regulatory Policy: Problems, Text, and Cases [Connected eBook with Study Center]. Aspen Publishing; 2022 Feb 25. [HTML]

Health Organization W. Towards a global guidance framework for the responsible use of life sciences: summary report of consultations on the principles, gaps and challenges of biorisk …. 2022. who.int

Kim DKD, Kreps GL. An analysis of government communication in the United States during the COVID‐19 pandemic: recommendations for effective government health risk communication. World Medical & Health Policy. 2020. nih.gov

Bak-Coleman JB, Alfano M, Barfuss W, Bergstrom CT, Centeno MA, Couzin ID, Donges JF, Galesic M, Gersick AS, Jacquet J, Kao AB. Stewardship of global collective behavior. Proceedings of the National Academy of Sciences. 2021 Jul 6;118(27):e2025764118. pnas.org

Howard J, Huang A, Li Z, Tufekci Z, Zdimal V, Van Der Westhuizen HM, Von Delft A, Price A, Fridman L, Tang LH, Tang V. An evidence review of face masks against COVID-19. Proceedings of the National Academy of Sciences. 2021 Jan 26;118(4):e2014564118. pnas.org

Sebhatu A, Wennberg K, Arora-Jonsson S, Lindberg SI. Explaining the homogeneous diffusion of COVID-19 nonpharmaceutical interventions across heterogeneous countries. Proceedings of the National Academy of Sciences. 2020 Sep 1;117(35):21201-8. pnas.org

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.