VIRTUAL OLAMDA IJTIMOIY MUHANDISLIK ORQALI SODIR ETILADIGAN HUQUQBUZARLIKLARNI OLDINI OLISH CHORALARI
Keywords:
Key words: Social engineering, Phishing, Pretexting, Deepfake, Quid pro quo, Cybersecurity, NetworksAbstract
Annotation
This article analyzes the issue of measures to prevent crimes committed through
social engineering in the virtual world from the perspective of international experience
and legislative documents of the Republic of Uzbekistan. The main types of social
engineering - phishing, fake profiles, malware and vishing - are examined in detail, and
their distribution trends in Uzbekistan and the world are illustrated with examples. The
article studies successful cybersecurity strategies of countries such as the USA, the
European Union, and Singapore, and discusses their adaptability to local conditions.
References
Foydanilgan adabiyotlar:
1. O‘zbekiston Respublikasi qonuni. (2019). “Shaxsiy ma’lumotlar to‘g‘risida”gi
qonun. O‘zbekiston Respublikasi Oliy Majlisi tomonidan qabul qilingan, 2-oktyabr,
2019-yil, № ZRU-571.
2. O‘zbekiston Respublikasi Jinoyat kodeksi. (1994). O‘zbekiston Respublikasi
Oliy Majlisi tomonidan qabul qilingan, 22-sentyabr, 1994-yil, № 2012-XII (keyingi
o‘zgartirishlar bilan).
3. O'zbekiston Respublikasi qonuni. (2003). “Axborot xavfsizligi to'g'risida”gi
qonun. O‘zbekiston Respublikasi Oliy Majlisi tomonidan qabul qilingan, 11-
dekabr, 2003-yil, № 560-II
4. Verizon. (2023). “2023 Data Breach Investigations Report.” Verizon Business.
https://www.verizon.com/business/resources/reports/dbir/
5. Reuters. (2016). “Bangladesh Bank Heist: How Hackers Stole $1 Billion.” Reuters,
10-mart, 2016-yil. https://www.reuters.com/article/us-cyber-heist-bangladesh-
idUSKCN0WC0TJ
6. Estonian Information System Authority. (2023). “Cybersecurity in Estonia:
Legislation and Strategy.” https://www.ria.ee/en/cybersecurity.html
7. Cybersecurity Agency of Singapore. (2023). “Cybersecurity Act and Initiatives.”
https://www.csa.gov.sg/legislation/cybersecurity-act
8. European Union. (2016). “General Data Protection Regulation (GDPR).”
Regulation (EU) 2016/679 of the European Parliament and of the Council, 27-aprel,
2016-yil. https://eur-lex.europa.eu/eli/reg/2016/679/oj
9. National Institute of Standards and Technology (NIST). (2020). “Special
Publication 800-63B: Digital Identity Guidelines.” U.S. Department of Commerce.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf
10. ENISA (European Union Agency for Cybersecurity). (2022). “Threat Landscape
2022.” https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022
11. Cybersecurity Agency of Singapore. (2023). “Cybersecurity Act and Initiatives.”
https://www.csa.gov.sg/legislation/cybersecurity-act
12. BM Security. (2022). “Cost of a Data Breach Report 2022.”
https://www.ibm.com/security/data-breach
13. United Kingdom National Cyber Security Centre (NCSC). (2023).
“Introduction to Social Engineering.”
https://www.ncsc.gov.uk/guidance/introduction-social-engineering
14. World Economic Forum. (2023). “Global Cybersecurity Outlook 2023.”
https://www.weforum.org/reports/global-cybersecurity-outlook-2023/
15. Interpol. (2022). “Cybercrime: Social Engineering Threats.”
https://www.interpol.int/Crimes/Cybercrime/Social-engineering-threats