METHODS OF PROTECTING USER DATA FROM MALICIOUS SOFTWARE ON SOCIAL NETWORKS

Evaluating Effective Strategies for Detecting and Preventing Malware Attacks

Authors

  • Elbek Qaxramonov TUIT
  • Abdukodir Karimov

Keywords:

cybersecurity, malware, social networks, phishing, user protection, digital security, artificial intelligence.

Abstract

This article discusses the increasing threat of malware on social networks and highlights some effective ways to safeguard user data. Social media platforms have become vital channels for communication, marketing, and information exchange; therefore, they have become an easy target for cyberattacks. The preventive approach, education on cybersecurity, and the use of artificial intelligence in this regard are discussed in this research study.

References

European Network and Information Security Agency (ENISA). Threat Landscape 2021. Available from: https://www.enisa.europa.eu/sites/default/files/publications/ENISA%20Threat%20Landscape%202021.pdf [Accessed 4 November 2025].

European Network and Information Security Agency (ENISA). Threat Landscape. Available from: https://www.enisa.europa.eu/topics/cyber-threats/threat-landscape [Accessed 4 November 2025].

OWASP. Web Security Testing Guide (WSTG). Available from: https://owasp.org/www-project-web-security-testing-guide/ [Accessed 4 November 2025].

FIDO Alliance. Passkeys / Passwordless Authentication. Available from: https://fidoalliance.org/passkeys/ [Accessed 4 November 2025].

Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. Available from: https://datatracker.ietf.org/doc/html/rfc8446 [Accessed 4 November 2025].

National Institute of Standards and Technology (NIST). FIPS 197: Advanced Encryption Standard (AES). Available from: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf [Accessed 4 November 2025].

RSA Laboratories. PKCS #1: RSA Cryptography Specifications. RFC 2313. Available from: https://datatracker.ietf.org/doc/html/rfc2313 [Accessed 4 November 2025].

Cloudflare Blog. A Detailed Look at RFC 8446 (TLS 1.3). Available from: https://blog.cloudflare.com/rfc-8446-aka-tls-1-3/ [Accessed 4 November 2025].

Malicious Phishing Detection in Social Networking Sites: A Systematic Review. ResearchGate. Available from: https://www.researchgate.net/publication/392680217_Multimodal_Phishing_Detection_on_Social_Networking_Sites_A_Systematic_Review [Accessed 4 November 2025].

Herath T. B. G., Khanna P., Ahmed M. “Cybersecurity Practices for Social Media Users: A Systematic Literature Review.” Journal of Cybersecurity and Privacy, 2022;2:1–18. DOI:10.3390/jcp2010001. Available from: https://doi.org/10.3390/jcp2010001 [Accessed 4 November 2025].

Albulayhi M. S., El Khediri S. “A Comprehensive Study on Privacy and Security on Social Media.” iJIM – International Journal of Interactive Mobile Technologies, 2022;16(01). DOI:10.3991/ijim.v16i01.27761. Available from: https://doi.org/10.3991/ijim.v16i01.27761 [Accessed 4 November 2025].

Koohang A., Floyd K., Yerby J., Paliszkiewicz J. “Social Media Privacy Concerns, Security Concerns, Trust, and Awareness: Empirical Validation of an Instrument.” Issues in Information Systems, 2021;22(2):133 145. DOI:10.48009/2_iis_2021_136 149. Available from: https://doi.org/10.48009/2_iis_2021_136 149 [Accessed 4 November 2025].

Efe A., Suliman H. “How Privacy Is Threatened from Social Media Communication?” Online Social Networks and Media, 2021;6(1):32 45. Available from: https://dergipark.org.tr/en/pub/bbd/issue/59753/817542 [Accessed 4 November 2025].

Ahmed L. K. “The Application: Social Media and Their Security.” ITM Conferences (ICACS 2024), 2024. Available from: https://www.itm-conferences.org/articles/itmconf/pdf/2024/07/itmconf_icacs2024_01006.pdf [Accessed 4 November 2025].

Published

2025-12-20

How to Cite

Qaxramonov, E., & Karimov, A. (2025). METHODS OF PROTECTING USER DATA FROM MALICIOUS SOFTWARE ON SOCIAL NETWORKS: Evaluating Effective Strategies for Detecting and Preventing Malware Attacks. The Descendants of Al-Fargani, 1(4), 145–150. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/958

Issue

Section

Статьи

Categories