SECURITY PROBLEMS OF INFORMATION SOURCES STORED ON THE INTERNET

Authors

  • Jamoliddinov Raxmatilla Baxtiyor o’g’li Academy of the Ministry of Internal Affairs of the Republic of Uzbekistan E-mail: jamoliddinovraxmatilla06@gmail.com
  • Butayeva Dilnozaxon Tulqinovna Teacher of general secondary school No. 1, Margilan city, Fergana region E-mail: dilnozabutaeva6@gmail.com

Keywords:

traffic analysis and scanning, prismdump, tcpdump, nmap, wireshark, scanrand, cain and abel, nessus, metasploit, aircrack-ng, wardriving.

Abstract

Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in dynamic and complicated cyberspace, and take them into account while developing holistic information security (IS) approaches for the IoT. Due to multiple vulnerabilities in the IoT foundations, many targeted attacks are continuing to evolve. This survey of related work in the very specialized field of IS assurance for the IoT develops a taxonomy of typical attacks against IoT assets (with special attention to IoT device protection). Based on this taxonomy, the key directions for countering these attacks are defined. According to the modern demand for the IoT and big IS-related data processing, we propose applying the Security Intelligence approach. The results obtained, when compared with the related work and numerous analogues, are based on the following research methodology: view the IoT as a security object to be protected, leading to understanding its vulnerabilities and possible attacks against the IoT exploiting these vulnerabilities, and from there approaches to protecting the IoT. A few areas of the future research, among which the IoT operational resilience and usage of the blockchain technology seem to us the most interesting, are indicated.

References

Jamoliddinov, Raxmatilla, and Maftuna Sultonova. "ПОТЕНЦИАЛ ИСКУССТВЕННОГО ИНТЕЛЛЕКТА В ОБЕСПЕЧЕНИИ ОБЩЕСТВЕННОЙ БЕЗОПАСНОСТИ И УМЕНЬШЕНИЯ ПРЕСТУПНОСТИ." Наука и технология в современном мире 2.18 (2023): 4-11.

Paula de M. One Man’s Trash Is... Dumpster-diving for disk drives raises eyebrows // U.S. Banker. 2004. № 114 (6). C. 12. https://search.proquest.com/docview/ 200721625.

J. Brodkin. Google crushes, shreds old hard drives to prevent data leakage // Network World. 2017. http://www.networkworld.com/article/2202487/data-center/google-crushes-shreds-old-hard-drives-to-preventdata-leakage.html.

Brandom. Russian hackers targeted Pentagon workers with malware-laced Twitter messages // The Verge. 2017. https://www.theverge.com/2017/5/18/15658300/ russia hacking-twitter-bots-pentagon-putin-election

Swanson A. Identity Theft, Line One // Collector. 2008. № 73 (12). C. 18–22, 24–26. https://search.proquest.com/docview/223219430.

Gupta P., and Mata-Toledo R. Cybercrime: in disguise crimes // Journal of Information Systems & Operations Management. 2016. C. 1–10. https://search.

a. proquest.com/docview/1800153259.

b. Gold S. Social engineering today: psychology, strategies and tricks // Network

c. Security. 2010. № 2010 (11). C. 11–14. https://search.proquest.com/docview/

787399306?accountid=45049. DOI: http://dx.doi.org/10.1016/S1353-4858(10) 70135-5.

Anderson T. Pretexting: What You Need to Know // Secur. Manage. 2010. № 54 (6). C

https://search.proquest.com/docview/504743883.

Harrison B., Svetieva E., and Vishwanath A. Individual processing of phishing emails // Online Information Review. 2016. № 40 (2). C. 265–281. https://search. proquest.com/docview/1776786039.

Каршиев У. Х. и др. ZAMONAVIY ICHKI ISHLAR ORGANI HODIMLARIDA CHET TILLARINI O’RNI VA AHAMIYATI! //INNOVATION IN THE MODERN EDUCATION SYSTEM. – 2023. – Т. 3. – №. 29. – С. 493-500.

Top 10 Phishing Attacks of 2014 – PhishMe // PhishMe. 2017. https://phishme.com/top-10-phishing-attacks-2014/. Amir W. Hackers Target Users with ‘Yahoo Account Confirmation’ Phishing

Email // HackRead. 2016. https://www.hackread.com/hackerstarget-users-withyahoo-account-confirmation-phishing-email/.

Dooley E. C. Calling scam hits locally: Known as vishing, scheme tricks people into giving personal data over phone // McClatchy – Tribune Business News. 2008. https://search.proquest.com/docview/464531113. Hamizi M. Social engineering and insider threats // Slideshare.net. 2017. https:// www.slideshare.net/pdawackomct/7-social-engineeringand-insider-threats. Hypponen M. Enlisting for the war on Internet fraud // CIO Canada. 2006. № 14 (10). C. 1. Available: https://search.proquest.com/docview/217426610.

Baxtiyor o‘g‘li, Jamoliddinov Raxmatilla. "O ‘ZBEKISTONDA REFERENDUM O ‘TKAZISHINING AKTUALLIGI." Journal of Universal Science Research 1.4 (2023): 564-567.

Duey R. Energy Industry a Prime Target for Cyber Evildoers // Refinery Tracker. 2014. № 6 (4). C. 1–2. https://search.proquest.com/docview/1530210690.

Chang J. J. S. An analysis of advance fee fraud on the internet // Journal of Financial Crime. 2008. № 15 (1). C. 71–81. https://search.proquest.com/docview/23598 6237?accountid=45049. DOI: http://dx.doi.org/10.1108/13590790810841716.

Packet sniffers – SecTools Top Network Security Tools // Sectools.org. 2017. http://sectools.org/tag/sniffers/

Downloads

Published

2024-02-15