Introduction to Cybersecurity: - Incident Containment, Eradication, and Recovery - Importance of cybersecurity - Post-Incident Analysis and Reporting - Threat landscape 10. Security Governance: 0. Network Security: - Security Policies and Procedures - Firewalls - Security Frameworks (e.g., NIST, ISO 27001) - Intrusion Detection Systems (IDS) - Security Audits and Assessments - Intrusion Prevention Systems (IPS) - Security Metrics and Reporting - Virtual Private Networks (VPNs) 11. Compliance and Legal Issues: - Network Segmentation - General Data Protection Regulation (GDPR) 1. Types of Cyber Threats: - Health Insurance Portability and Accountability Act - Malware (viruses, worms, ransomware, etc.) (HIPAA) - Phishing attacks - Payment Card Industry Data Security Standard (PCI DSS) - Denial of Service (DoS) attacks - Cybersecurity Maturity Model Certification (CMMC) - Man-in-the-Middle (MitM) attacks 12. Vulnerability Management: 2. Information Security: - Vulnerability Scanning - Data Encryption - Patch Management - Data Loss Prevention (DLP) - Common Vulnerabilities and Exposures (CVE) - Secure Data Storage - Vulnerability Remediation - Secure File Transfer Protocols (SFTP) 13. Security Awareness Training: 3. Application Security, Web Security: - Phishing Awareness - Secure Software Development Life Cycle (SDLC) - Social Engineering - Application Vulnerability Testing (e.g., SQL Injection, XSS) - Secure Password Practices - Code Reviews and Static Analysis - Safe Internet Browsing - Web Application Firewalls (WAF) 14. Risk Management: - Secure Sockets Layer (SSL) and Transport Layer Security - Risk Assessment and Analysis (TLS) - Risk Mitigation Strategies - Cross-Site Scripting (XSS) - Business Continuity Planning (BCP) - SQL Injection - Disaster Recovery Planning (DRP) 4. Endpoint Security: 15. Penetration Testing: - Antivirus and Antimalware - Red Teaming - Endpoint Detection and Response (EDR) - Ethical Hacking - Patch Management - Social Engineering Tests - Device Encryption - Wireless Network Testing 5. Cloud Security: 16. Security Operations Center (SOC): - Cloud Security Posture Management (CSPM) - SOC Roles and Responsibilities - Cloud Access Security Brokers (CASB) - Security Information and Event Management (SIEM) - Secure Cloud Configurations - Log Analysis and Monitoring - Identity and Access Management (IAM) in Cloud - Incident Management 6. Cryptography: 17. Physical Security: - Symmetric and Asymmetric Encryption - Secure Facility Design - Hashing Algorithms - Access Control Systems - Digital Signatures - Surveillance Systems - Public Key Infrastructure (PKI) - Environmental Controls (e.g., fire suppression, HVAC) 7. Identity and Access Management (IAM): 18. Emerging Threats: - Password security - Ransomware - Multi-Factor Authentication (MFA) - Advanced Persistent Threats (APTs) - Single Sign-On (SSO) - Zero-Day Exploits - Role-Based Access Control (RBAC) - Internet of Things (IoT) security - Privileged Access Management (PAM) - Artificial Intelligence (AI) in cybersecurity 8. Threat Intelligence: - Blockchain security - Threat Hunting - Internet of Things (IoT) Security - Cyber Threat Intelligence (CTI) 19. Ethical and Social Issues in Cybersecurity: - Indicators of Compromise (IOCs) - Privacy Concerns - Threat Feeds and Sharing Platforms - Cyber Warfare and Cyber Terrorism 9. Incident Response: - Cyber Ethics - Incident Response Plan (IRP) - Responsible Disclosure - Forensic Analysis KXni oldini olish usullari 9. Incident Response: - Parol xavfsizligi - Incident response plan - Ko'p faktorli autentifikatsiya (MFA) - Steps in incident response (Preparation, Identification, - Yagona kirish (SSO) Containment, Eradication, Recovery, Lessons Learned) - Rolga asoslangan kirishni boshqarish (RBAC) 10. Security Policies and Governance: - Imtiyozli kirishni boshqarish (PAM) - Security policies and procedures 8. Tahdid razvedkasi: - Compliance and regulatory requirements (GDPR, HIPAA, - Tahdid ovi etc.) - Cyberthreat Intelligence (CTI) 13. Secure Software Development: - Murosa ko'rsatkichlari (XOQ) - Secure coding practices - Tahdid tasmasi va almashish platformalari - Security testing (penetration testing, code review) 9. Hodisaga javob: - Voqealarga javob rejasi (IRP) Kiberxavfsizlikka kirish: - Sud-tibbiy tahlil - Kiberxavfsizlikning ahamiyati - Hodisalarni to'xtatish, yo'q qilish va tiklash - Tahdid manzarasi - Hodisadan keyingi tahlil va hisobot 0. Tarmoq xavfsizligi: 10. Xavfsizlikni boshqarish: - Faervollar - Xavfsizlik siyosati va tartiblari - Intrusionlarni aniqlash tizimlari (IDS) - Xavfsizlik asoslari (masalan, NIST, ISO 27001) - Intrusionlarni oldini olish tizimlari (IPS) - Xavfsizlik tekshiruvlari va baholashlari - Virtual xususiy tarmoqlar (VPNlar) - Xavfsizlik ko'rsatkichlari va hisoboti - Tarmoq segmentatsiyasi 11. Muvofiqlik va huquqiy masalalar: 1. Kibertahdidlar turlari: - Umumiy ma'lumotlarni himoya qilish qoidalari (GDPR) - Zararli dasturlar (viruslar, qurtlar, to'lov dasturlari va - Sog'liqni saqlash sug'urtasi portativligi va javobgarligi boshqalar). to'g'risidagi qonun (HIPAA) - Fishing hujumlari - To'lov kartalari sanoati ma'lumotlar xavfsizligi standarti (PCI - Xizmatni rad etish (DoS) hujumlari DSS) - Man-in-the-Middle (MitM) hujumlari - Kiberxavfsizlikning etuklik modeli sertifikati (CMMC) 2. Axborot xavfsizligi: 12. Zaiflikni boshqarish: - Ma'lumotlarni shifrlash - Zaiflikni skanerlash - Ma'lumotlar yo'qotilishining oldini olish (DLP) - Yamoqlarni boshqarish - Xavfsiz ma'lumotlarni saqlash - Umumiy zaifliklar va ta'sirlar (CVE) - Xavfsiz fayl uzatish protokollari (SFTP) - Zaiflikni bartaraf etish 3. Ilova xavfsizligi, veb xavfsizligi: 13. Xavfsizlik bo'yicha o'qitish: - Xavfsiz dasturiy ta'minotni ishlab chiqish hayotiy tsikli - Fishingdan xabardorlik (SDLC) - Ijtimoiy muhandislik - Ilovaning zaifligini tekshirish (masalan, SQL Injection, XSS) - Xavfsiz parol amaliyotlari - Kodlarni ko'rib chiqish va statik tahlil - Internetni xavfsiz ko'rish - Veb ilovalar xavfsizlik devori (WAF) 14. Risklarni boshqarish: - Secure Sockets Layer (SSL) va Transport Layer Security (TLS) - Risklarni baholash va tahlil qilish - Saytlararo skript (XSS) - Xatarlarni kamaytirish strategiyalari - SQL in'ektsiyasi - Biznes uzluksizligini rejalashtirish (BCP) 4. Oxirgi nuqta xavfsizligi: - Tabiiy ofatlarni tiklashni rejalashtirish (DRP) - Antivirus va antimalware 15. Penetratsiya testi: - Yakuniy nuqtani aniqlash va javob berish (EDR) - Qizil jamoa - Yamoqlarni boshqarish - axloqiy xakerlik - Qurilmani shifrlash - Ijtimoiy muhandislik testlari 5. Bulutli xavfsizlik: - Simsiz tarmoq sinovi - Bulutli xavfsizlik holatini boshqarish (CSPM) 16. Xavfsizlik operatsiyalari markazi (SOC): - Bulutga kirish xavfsizligi brokerlari (CASB) - SOC rollari va majburiyatlari - Xavfsiz bulutli konfiguratsiyalar - Xavfsizlik ma'lumotlari va hodisalarni boshqarish (SIEM) - Bulutda Identity and Access Management (IAM). - Jurnallarni tahlil qilish va monitoring qilish 6. Kriptografiya: - Voqealarni boshqarish - Simmetrik va assimetrik shifrlash 17. Jismoniy xavfsizlik: - Xesh algoritmlari - Xavfsiz ob'ekt dizayni - Raqamli imzolar - kirishni boshqarish tizimlari - Ochiq kalitlar infratuzilmasi (PKI) - Kuzatuv tizimlari 7. Identity and Access Management (IAM): - Atrof-muhit nazorati (masalan, yong'inni o'chirish, HVAC) 18. Rivojlanayotgan tahdidlar: - Identity and Access Management (IAM) - Ransomware - Zero Trust Architecture - Kengaytirilgan doimiy tahdidlar (APTs) - Zero-Day Exploits 5. **Network Segmentation (Tarmoqni Segmentatsiya - Narsalar Interneti (IoT) xavfsizligi Qilish)** - Kiberxavfsizlikda sun'iy intellekt (AI). - VLAN (Virtual Local Area Network) - Blokcheyn xavfsizligi - Subnetting va IP tarmog'ini segmentatsiya qilish - Narsalar Interneti (IoT) xavfsizligi - Demilitarized Zone (DMZ) 19. Kiberxavfsizlikda axloqiy va ijtimoiy masalalar: - Mikrosegmentatsiya - Maxfiylik tashvishlari - Kiber urush va kiber terrorizm 6. **Data Loss Prevention (DLP)** - Kiberaxloq - DLP strategiyalari va texnologiyalari - Mas'uliyatni oshkor qilish - Ma'lumotlarni tasniflash va monitoring qilish bartaraf etish usullari - End-to-end shifrlash 9. Hodisaga javob: - Shaxsiy ma'lumotlarni himoya qilish - Voqealarni bartaraf etish rejasi - Voqealarga javob berish bosqichlari (tayyorlash, aniqlash, 7. **Security Information and Event Management (SIEM)** to'xtatish, yo'q qilish, tiklash, o'rganilgan saboqlar) - SIEM arxitekturasi va komponentlari 10. Xavfsizlik siyosati va boshqaruvi: - Log yig'ish va tahlil qilish - Xavfsizlik siyosati va protseduralari - Anomaly detection va hodisalarni korrelyatsiya qilish - Muvofiqlik va me'yoriy talablar (GDPR, HIPAA va boshqalar) - SIEM konfiguratsiyasi va boshqaruvi 13. Xavfsiz dasturiy ta'minotni ishlab chiqish: - Xavfsiz kodlash amaliyoti 8. **Patch Management (Yamovlarni Boshqarish)** - Xavfsizlik testi (kirish testi, kodni tekshirish) - Patch management jarayonlari va texnikalari - Zafliklarni boshqarish va CVE (Common Vulnerabilities and Exposures) identifikatsiyasi Kiberxavfsizlikda tarmoq xavfsizligi keng va chuqur mavzu - Patch deployment strategiyalari bo'lib, tarmoqning turli qismlarini himoya qilishga qaratilgan - Patch management vositalari ko'plab jihatlarni o'z ichiga oladi. Quyida tarmoq xavfsizligi bo'yicha batafsil mavzular ro'yxati keltirilgan: 9. **Network Access Control (NAC)** - NAC siyosatlari va autentifikatsiya ### Tarmoq Xavfsizligi Mavzulari: - 802.1X va port-based NAC - Posture assessment va remediation 1. **Firewall (Olov Devori)** - BYOD (Bring Your Own Device) xavfsizligi - Statik va dinamik firewollar - Next-Generation Firewall (NGFW) 10. **Secure Network Design** - Firewall qoidalari va siyosatlari - Defense-in-depth va security by design tamoyillari - Stateful va stateless inspection - Qo'rg'on va bo'rdoq arxitekturasi - Redundancy va yuqori mavjudlik (high availability) 2. **Intrusion Detection Systems (IDS) va Intrusion - Tarmoq monitoringi va tahlil qilish Prevention Systems (IPS)** - IDS turlari: tarmoq asosidagi (NIDS) va xost asosidagi 11. **Threat Intelligence va Incident Response** (HIDS) - Threat intelligence manbalari va tahlili - IPS turlari va funksionalligi - Incident response rejasi va protseduralari - Anomaly detection va signature-based detection - Threat hunting va forensik tahlil - IDS/IPS konfiguratsiyasi va boshqaruvi - SOAR (Security Orchestration, Automation, and Response) 3. **Virtual Private Network (VPN)** - VPN protokollari: IPsec, SSL/TLS, PPTP, L2TP - Site-to-site va remote access VPN - VPN konfiguratsiyasi va boshqaruvi - VPN xavfsizligi va xatoliklar 12. **Wireless Network Security** - Wi-Fi xavfsizligi protokollari: WEP, WPA, WPA2, WPA3 - Wireless Intrusion Detection Systems (WIDS) - Secure Wi-Fi konfiguratsiyasi va boshqaruvi - Mobil qurilmalar xavfsizligi 4. **Access Control (Kirishni Nazorat Qilish)** 13. **IoT (Internet of Things) Xavfsizligi** - Access Control List (ACL) va rolga asoslangan kirish - IoT qurilmalari va tarmoqlarining xavfsizligi nazorati (RBAC) - IoT uchun autentifikatsiya va shifrlash - Multi-Factor Authentication (MFA) - IoT xavfsizlik protokollari va standartlari - IoT xavfsizlikka oid eng yaxshi amaliyotlar 14. **Network Forensics** - Tarmoq hodisalarini tahlil qilish va izlash - Packet capture va tahlil qilish - Tarmoqdagi tahdidlarni aniqlash va izohlash - Network forensic tools va uskunalari 15. **Cloud Network Security** - Cloud tarmoqlarining xavfsizligi - Cloud access security broker (CASB) - Cloud firewall va IDS/IPS - Cloud-native security vositalari ### Tarmoq Xavfsizligini Amalga Oshirish Bo'yicha Qadamlar: 1. **Xavfsizlik Siyosatini Ishlab Chiqish**: - Tarmoq xavfsizligini ta'minlash uchun qoidalar va protseduralar. 2. **Xavfsizlik Qurilmalarini O'rnatish**: - Firewollar, IDS/IPS, va VPN kabi xavfsizlik qurilmalarini o'rnatish va sozlash. 3. **Tarmoqni Segmentatsiya Qilish**: - VLAN va subnetting yordamida tarmoqni segmentlarga ajratish. 4. **Kirishni Nazorat Qilish**: - ACL, RBAC, va MFA kabi kirishni nazorat qilish usullarini joriy qilish. 5. **Xavfsizlik Monitoringini O'rnatish**: - SIEM tizimlari orqali tarmoq trafigini va hodisalarni kuzatish. 6. **Patch Management va Vulnerability Management**: - Dasturiy ta'minotlarni muntazam yangilab borish va zaifliklarni bartaraf etish. 7. **Xodimlarni O'qitish va Xabardorlikni Oshirish**: - Xodimlarni kiberxavfsizlik haqida muntazam o'qitish va ularning xabardorligini oshirish. Ushbu mavzular va qadamlar tarmoq xavfsizligini ta'minlashda yordam beradi va kiberxavfsizlik tahdidlariga qarshi samarali kurashishga imkon yaratadi.