COMMON PHISHING ATTACKS IN KAZAKHSTAN AND WAYS TO PROTECT CITIZENS FROM INTERNET SCAMMERS
Kalit so‘zlar:
phishing attack, social engineering, malware-based phishing, phishing websites, phisher, internet, deceptive phishing, clone phishing.Annotatsiya
This article examines common types of phishing attacks using Kazakhstan as an example, with the goal of raising awareness and suggesting effective protection measures against Internet scammers. The study analyzes the most popular phishing tactics used in the region. By identifying specific threats and vulnerabilities unique to Kazakhstan, the article strives to give readers a thorough understanding of the risks they face in the online environment. In addition to analyzing the situation with phishing, the article discusses preventive measures to protect citizens from such attacks. It provides practical insight into defense strategies, emphasizing both individual and collective efforts to improve cybersecurity resilience. The article is intended to provide readers with the knowledge necessary to recognize and mitigate potential threats. The findings and recommendations presented in this article serve as a valuable resource for individuals and businesses looking to strengthen their defenses against the ever-changing tactics used by online scammers.
Adabiyotlar
State Technical Service Joint-stock company of Kazakhstan (2022). Итоговый дайджест АО «ГТС» за 2022 год. https://sts.kz/itogi-goda/
State Technical Service Joint-stock company of Kazakhstan (2023). Итоговый дайджест АО «ГТС» за 2023 год. https://sts.kz/itogi-goda/
Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future internet, 12(10), 168. , https://doi.org/10.3390/fi12100168
Alam, M. N., Sarma, D., Lima, F. F., Saha, I., Ulfath, R.-E.-, & Hossain, S. (2020). Phishing Attacks Detection using Machine Learning Approach. 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT).
https://doi.org/10.1109/icssit48917.2020.9214225
Huang, H., Tan, J., & Liu, L. (2009). Countermeasure Techniques for Deceptive Phishing Attack. 2009 International Conference on New Trends in Information and Service Science. https://doi.org/10.1109/niss.2009.80
Kumar, Mr & Gouda, Sandeepta. (2023). A comprehensive study of phishing attacks and their countermeasures. https://doi.org/10.13140/RG.2.2.36686.13120.
State Technical Service Joint-stock company of Kazakhstan (2023). Технический разбор инцидента с фальшивым обновлением NCALayer. https://sts.kz/2023/09/07/tehnicheskij-razbor-incidenta-s-falshivym-obnovleniem-ncalayer/
Yuklab olishlar
Nashr etilgan
Son
Bo‘lim
Litsenziya
Mualliflik huquqi (c) 2024 Scientific journal of the Fergana State University

Ushbu ish Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 Xalqaro litsenziyasi ostida litsenziyalangan.
Xuddi shu muallif (lar) ning eng ko'p o'qilgan maqolalari
- Quvvatali Raximov, Maksadjon Onarkulov, Danagul Karimova, ИСПОЛЬЗОВАНИЕ ОБЛАЧНЫХ ТЕХНОЛОГИЙ В АНАЛИЗЕ УЯЗВИМОСТЕЙ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ , Scientific journal of the Fergana State University: № 3 (2024): FarDU.Ilmiy xabarlar jurnali (Aniq va tabiiy fanlar)
- Quvvatali Raximov, Kaldijan Bulanov, Shavkat Ibragimov, ИЗУЧЕНИЕ ЭФФЕКТИВНОСТИ ИНСТРУМЕНТОВ С ОТКРЫТЫМ ИСХОДНЫМ КОДОМ ДЛЯ ВОССТАНОВЛЕНИЯ НЕТРАДИЦИОННО УДАЛЕННЫХ ДАННЫХ , Scientific journal of the Fergana State University: № 3 (2024): FarDU.Ilmiy xabarlar jurnali (Aniq va tabiiy fanlar)