Методы защиты данных пользователей от вредоносного программного обеспечения в социальных сетях

Оценка эффективности стратегий обнаружения и предотвращения атак вредоносного ПО.

Авторы

  • Elbek Qaxramonov TUIT
  • Abdukodir Karimov

Ключевые слова:

кибербезопасность, вредоносное ПО, социальные сети, фишинг, защита пользователей, цифровая безопасность, искусственный интеллект.

Аннотация

This article discusses the increasing threat of malware on social networks and highlights some effective ways to safeguard user data. Social media platforms have become vital channels for communication, marketing, and information exchange; therefore, they have become an easy target for cyberattacks. The preventive approach, education on cybersecurity, and the use of artificial intelligence in this regard are discussed in this research study.

Библиографические ссылки

European Network and Information Security Agency (ENISA). Threat Landscape 2021. Available from: https://www.enisa.europa.eu/sites/default/files/publications/ENISA%20Threat%20Landscape%202021.pdf [Accessed 4 November 2025].

European Network and Information Security Agency (ENISA). Threat Landscape. Available from: https://www.enisa.europa.eu/topics/cyber-threats/threat-landscape [Accessed 4 November 2025].

OWASP. Web Security Testing Guide (WSTG). Available from: https://owasp.org/www-project-web-security-testing-guide/ [Accessed 4 November 2025].

FIDO Alliance. Passkeys / Passwordless Authentication. Available from: https://fidoalliance.org/passkeys/ [Accessed 4 November 2025].

Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. Available from: https://datatracker.ietf.org/doc/html/rfc8446 [Accessed 4 November 2025].

National Institute of Standards and Technology (NIST). FIPS 197: Advanced Encryption Standard (AES). Available from: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf [Accessed 4 November 2025].

RSA Laboratories. PKCS #1: RSA Cryptography Specifications. RFC 2313. Available from: https://datatracker.ietf.org/doc/html/rfc2313 [Accessed 4 November 2025].

Cloudflare Blog. A Detailed Look at RFC 8446 (TLS 1.3). Available from: https://blog.cloudflare.com/rfc-8446-aka-tls-1-3/ [Accessed 4 November 2025].

Malicious Phishing Detection in Social Networking Sites: A Systematic Review. ResearchGate. Available from: https://www.researchgate.net/publication/392680217_Multimodal_Phishing_Detection_on_Social_Networking_Sites_A_Systematic_Review [Accessed 4 November 2025].

Herath T. B. G., Khanna P., Ahmed M. “Cybersecurity Practices for Social Media Users: A Systematic Literature Review.” Journal of Cybersecurity and Privacy, 2022;2:1–18. DOI:10.3390/jcp2010001. Available from: https://doi.org/10.3390/jcp2010001 [Accessed 4 November 2025].

Albulayhi M. S., El Khediri S. “A Comprehensive Study on Privacy and Security on Social Media.” iJIM – International Journal of Interactive Mobile Technologies, 2022;16(01). DOI:10.3991/ijim.v16i01.27761. Available from: https://doi.org/10.3991/ijim.v16i01.27761 [Accessed 4 November 2025].

Koohang A., Floyd K., Yerby J., Paliszkiewicz J. “Social Media Privacy Concerns, Security Concerns, Trust, and Awareness: Empirical Validation of an Instrument.” Issues in Information Systems, 2021;22(2):133 145. DOI:10.48009/2_iis_2021_136 149. Available from: https://doi.org/10.48009/2_iis_2021_136 149 [Accessed 4 November 2025].

Efe A., Suliman H. “How Privacy Is Threatened from Social Media Communication?” Online Social Networks and Media, 2021;6(1):32 45. Available from: https://dergipark.org.tr/en/pub/bbd/issue/59753/817542 [Accessed 4 November 2025].

Ahmed L. K. “The Application: Social Media and Their Security.” ITM Conferences (ICACS 2024), 2024. Available from: https://www.itm-conferences.org/articles/itmconf/pdf/2024/07/itmconf_icacs2024_01006.pdf [Accessed 4 November 2025].

Загрузки

Опубликован

2025-12-20

Как цитировать

Qaxramonov, E., & Karimov, A. (2025). Методы защиты данных пользователей от вредоносного программного обеспечения в социальных сетях: Оценка эффективности стратегий обнаружения и предотвращения атак вредоносного ПО. Потомки Аль-Фаргани, 1(4), 145–150. извлечено от https://al-fargoniy.uz/index.php/journal/article/view/958

Выпуск

Раздел

Статьи

Категории