VIRTUAL OLAMDA IJTIMOIY MUHANDISLIK ORQALI SODIR ETILADIGAN HUQUQBUZARLIKLARNI OLDINI OLISH CHORALARI

Authors

  • Isaqov Abror Faxriddinovich Author
  • Yusupov Djavohir O‘tkirovich Author

Keywords:

Key words: Social engineering, Phishing, Pretexting, Deepfake, Quid pro quo, Cybersecurity, Networks

Abstract

Annotation 
This article analyzes the issue of measures to prevent crimes committed through 
social engineering in the virtual world from the perspective of international experience 
and legislative documents of the Republic of Uzbekistan. The main types of social 
engineering - phishing, fake profiles, malware and vishing - are examined in detail, and 
their distribution trends in Uzbekistan and the world are illustrated with examples. The 
article studies successful cybersecurity strategies of countries such as the USA, the 
European Union, and Singapore, and discusses their adaptability to local conditions. 

References

Foydanilgan adabiyotlar:

1. O‘zbekiston Respublikasi qonuni. (2019). “Shaxsiy ma’lumotlar to‘g‘risida”gi

qonun. O‘zbekiston Respublikasi Oliy Majlisi tomonidan qabul qilingan, 2-oktyabr,

2019-yil, № ZRU-571.

2. O‘zbekiston Respublikasi Jinoyat kodeksi. (1994). O‘zbekiston Respublikasi

Oliy Majlisi tomonidan qabul qilingan, 22-sentyabr, 1994-yil, № 2012-XII (keyingi

o‘zgartirishlar bilan).

3. O'zbekiston Respublikasi qonuni. (2003). “Axborot xavfsizligi to'g'risida”gi

qonun. O‘zbekiston Respublikasi Oliy Majlisi tomonidan qabul qilingan, 11-

dekabr, 2003-yil, № 560-II

4. Verizon. (2023). “2023 Data Breach Investigations Report.” Verizon Business.

https://www.verizon.com/business/resources/reports/dbir/

5. Reuters. (2016). “Bangladesh Bank Heist: How Hackers Stole $1 Billion.” Reuters,

10-mart, 2016-yil. https://www.reuters.com/article/us-cyber-heist-bangladesh-

idUSKCN0WC0TJ

6. Estonian Information System Authority. (2023). “Cybersecurity in Estonia:

Legislation and Strategy.” https://www.ria.ee/en/cybersecurity.html

7. Cybersecurity Agency of Singapore. (2023). “Cybersecurity Act and Initiatives.”

https://www.csa.gov.sg/legislation/cybersecurity-act

8. European Union. (2016). “General Data Protection Regulation (GDPR).”

Regulation (EU) 2016/679 of the European Parliament and of the Council, 27-aprel,

2016-yil. https://eur-lex.europa.eu/eli/reg/2016/679/oj

9. National Institute of Standards and Technology (NIST). (2020). “Special

Publication 800-63B: Digital Identity Guidelines.” U.S. Department of Commerce.

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf

10. ENISA (European Union Agency for Cybersecurity). (2022). “Threat Landscape

2022.” https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022

11. Cybersecurity Agency of Singapore. (2023). “Cybersecurity Act and Initiatives.”

https://www.csa.gov.sg/legislation/cybersecurity-act

12. BM Security. (2022). “Cost of a Data Breach Report 2022.”

https://www.ibm.com/security/data-breach

13. United Kingdom National Cyber Security Centre (NCSC). (2023).

“Introduction to Social Engineering.”

https://www.ncsc.gov.uk/guidance/introduction-social-engineering

14. World Economic Forum. (2023). “Global Cybersecurity Outlook 2023.”

https://www.weforum.org/reports/global-cybersecurity-outlook-2023/

15. Interpol. (2022). “Cybercrime: Social Engineering Threats.”

https://www.interpol.int/Crimes/Cybercrime/Social-engineering-threats

Published

2025-03-31

How to Cite

Isaqov Abror Faxriddinovich, & Yusupov Djavohir O‘tkirovich. (2025). VIRTUAL OLAMDA IJTIMOIY MUHANDISLIK ORQALI SODIR ETILADIGAN HUQUQBUZARLIKLARNI OLDINI OLISH CHORALARI . Ta’lim Innovatsiyasi Va Integratsiyasi, 42(2), 116-126. https://scientific-jl.com/tal/article/view/7005