KIBERJINOYATLARNI TERGOV QILISHNING O‘ZIGA XOS XUSUSIYATLARI

Mualliflar

  • Nodirjon Xabibiddinov Toshkent davlat yuridik universiteti

Kalit so‘zlar:

kiberjinoyatlar, raqamli dalillar, kiberxavfsizlik, kompyuter-texnik ekspertiza, xalqaro hamkorlik, raqamli kriminalistika, kiberhujumlar, tergov metodikasi

Avstrakt

 Zamonaviy raqamli texnologiyalarning jadal rivojlanishi natijasida kiberjinoyatlar soni va murakkablik darajasi sezilarli darajada ortib bormoqda. Ushbu tadqiqot kiberjinoyatlarni tergov qilishning o'ziga xos xususiyatlari, mavjud muammolar va ularning yechim yo'llarini tahlil qiladi. Maqolada kiberjinoyatlarning asosiy turlari, sodir etilish usullari, tergov jarayonida qo'llaniladigan zamonaviy texnologiyalar va xalqaro hamkorlik masalalari ko'rib chiqilgan. Tadqiqot natijalari raqamli dalillarni to'plash murakkabligi, maxsus texnik bilimlar zarurligini va kiberxavfsizlik sohasidagi mutaxassislarning yetishmasligini ko'rsatadi. Kiberjinoyatlarga qarshi samarali kurashish uchun normativ-huquqiy bazani takomillashtirish va xalqaro standartlarni joriy etish tavsiya etilgan.

##submission.authorBiography##

  • ##submission.authorWithAffiliation##

    Jinoyat-protsessual huquqi kafedrasi o‘qituvchi-yordamchisi Magistratura va sirtqi ta’lim fakulteti Kiber huquq yo‘nalishi talabasi

##submission.citations##

1. Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (10-11).

2. Gupta, B. B., & Dahiya, A. (2021). Distributed denial of service (DDOS) attacks: Classification, attacks, challenges and countermeasures (4-6). CRC Press.

3. Ghazi‐Tehrani, A. K., & Pontell, H. N. (2021). Phishing Evolves: Analyzing the Enduring Cybercrime. Victims & Offenders, 16(3), 316–342.

4. Deckard, J. (2005). Buffer overflow attacks: Detect, exploit, prevent (7-9). Elsevier.

5. Salahdine, F., & Kaabouch, N. (2019). Social Engineering Attacks: a survey. Future Internet, 11(4), 89.

6. Garcia, N. (2018). Digital steganography and its existence in cybercrime (5-6). Scientific and Practical Cyber Security Journal..

7. Zaytsev, O. (2006). Rootkits, Spyware/Adware, keyloggers and backdoors: Detection and neutralization (25-27). BHV-Petersburg..

8. Al-Khater, W., Al-Maadeed, S., Ahmed, A. A., Sadiq, A. S., & Khan, M. K. (2020b). Comprehensive review of Cybercrime detection techniques. IEEE Access, 8, 137293–137311.

9. Shinde, A. (2021). Introduction to cyber security: Guide to the world of cyber security (3-5). Notion Press.

Internet saytlari:

1. Google Scholar. httрs://sсhоlаr.gооgle.соm/

2. CyberLeninka. httрs://сyberleninkа.ru/

3. Science Direct.https://www.sciencedirect.com/

4. ResearchGate. https://www.researchgate.net/

5. Osforensics. https://www.osforensics.com/

[1] https://www.interpol.int/Crimes/Cybercrime

[2].Vardanyan A.V., Nikitina E.V. Rassledovanieprestuplenii v sferevyso-kikhtekhnologiiikomp’yuternoiinformatsii Investigation of Hi-Tech and Computer Information Crimes]. Moscow, Yurlitinform Publ.

[3] https://aag-it.com/the-latest-cyber-crime-statistics/

[4] https://kun.uz/news/2023/12/20/ozbekistonda-2023-yilda-55-mingta-kiberjinoyat-sodir-etildi

[5] Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. 10-11

[6] Shinde, A. (2021, pp. 3-5). Introduction to cyber security: Guide to the World of Cyber Security. Notion Press.

[7] Bothra, H. (2017,pp. 9-10). Hacking: Be a Hacker with Ethics. KHANNA PUBLISHING.

[8] https://www.pandasecurity.com/en/mediacenter/types-of-cybercrime/

[9] Gupta, B. B., & Dahiya, A. (2021, pp. 4-6). Distributed denial of service (DDOS) attacks: Classification,

Attacks, Challenges and Countermeasures. CRC Press.

[10] Ghazi‐Tehrani, A. K., & Pontell, H. N. (2021). Phishing Evolves: Analyzing the Enduring Cybercrime. Victims & Offenders, 16(3), 316–342. https://doi.org/10.1080/15564886.2020.1829224

[11] https://www.proofpoint.com/us/threat-reference/pharming

[12] https://www.avast.com/c-cracking

[13] Deckard, J. (2005, pp. 7-9). Buffer overflow attacks: Detect, Exploit, Prevent. Elsevier.

[14] Salahdine, F., & Kaabouch, N. (2019). Social Engineering Attacks: a survey. Future Internet, 11(4), 89. https://doi.org/10.3390/fi11040089

[15] Garcia, Natasha, (2018, pp. 5-6). Digital steganography and its existence in cybercrime. Scientific and Practical Cyber Security Journal.

[16] https://www.malwarebytes.com/blog/threats/remote-access-trojan-rat

[17] Zaytsev, O. (2006, pp. 25-27). Rootkits, Spyware/Adware, keyloggers and backdoors: Detection and neutralization. БХВ-Петербург.

[18] Al-Khater, W., Al-Maadeed, S., Ahmed, A. A., Sadiq, A. S., & Khan, M. K. (2020b). Comprehensive review of Cybercrime detection techniques. IEEE Access, 8, 137293–137311. https://doi.org/10.1109/access.2020.3011259

[19] https://blog.merklescience.com/general/investigating-blockchain-crimes-using-blockchain-forensics

##submission.downloads##

Nashr qilingan

2025-05-26