OPPORTUNITY PROTECTION PUTEM MONITORING THREAT SOCIAL NETWORKS

G. Zhidekulova, A. Abduvalova, S. Bekbolatov
{"title":"OPPORTUNITY PROTECTION PUTEM MONITORING THREAT SOCIAL NETWORKS","authors":"G. Zhidekulova, A. Abduvalova, S. Bekbolatov","doi":"10.53360/2788-7995-2023-1(9)-4","DOIUrl":null,"url":null,"abstract":"Currently, every second inhabitant of the planet is registered in Vkontakte, Whatsapp, Instagram, Skype, Periscope and other social networks. Worst of all, social media can also endanger human life. In many cases, illicit trafficking in drugs and psychotropic substances can spread through these social networks, so special attention should be paid to studying the problems of trust in information in the virtual space.Since social network analysis is a field that is practiced all over the world, it is not surprising that there are many programs, as well as the creation of a system using the Python programming language, which analyzes texts in various subject areas that our society needs and tries to monitor the entire virtual world. We can achieve this goal by introducing the necessary algorithms into a special program.In order to detect and prevent illegal actions, it was considered to organize the monitoring of social networks and the prevention of crimes organized via the Internet by creating software for monitoring social networks.The article discusses the types of cyber threats and methods of protection against them, as well as a program for monitoring social networks in the Python environment and shows its results. Based on the results obtained, he considered the possibility of prevention by identifying types of threats. ","PeriodicalId":191030,"journal":{"name":"Bulletin of Shakarim University. Technical Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Bulletin of Shakarim University. Technical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53360/2788-7995-2023-1(9)-4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Currently, every second inhabitant of the planet is registered in Vkontakte, Whatsapp, Instagram, Skype, Periscope and other social networks. Worst of all, social media can also endanger human life. In many cases, illicit trafficking in drugs and psychotropic substances can spread through these social networks, so special attention should be paid to studying the problems of trust in information in the virtual space.Since social network analysis is a field that is practiced all over the world, it is not surprising that there are many programs, as well as the creation of a system using the Python programming language, which analyzes texts in various subject areas that our society needs and tries to monitor the entire virtual world. We can achieve this goal by introducing the necessary algorithms into a special program.In order to detect and prevent illegal actions, it was considered to organize the monitoring of social networks and the prevention of crimes organized via the Internet by creating software for monitoring social networks.The article discusses the types of cyber threats and methods of protection against them, as well as a program for monitoring social networks in the Python environment and shows its results. Based on the results obtained, he considered the possibility of prevention by identifying types of threats. 
机会保护系统监控威胁社会网络
目前,地球上每两个居民中就有一个在Vkontakte、Whatsapp、Instagram、Skype、Periscope和其他社交网络上注册。最糟糕的是,社交媒体也会危及人类的生命。在许多情况下,毒品和精神药物的非法贩运可以通过这些社交网络传播,因此应特别注意研究虚拟空间中的信息信任问题。由于社会网络分析是一个在世界各地实践的领域,因此有许多程序以及使用Python编程语言创建的系统并不奇怪,它分析了我们社会需要的各种主题领域的文本,并试图监控整个虚拟世界。我们可以通过在一个特殊的程序中引入必要的算法来实现这一目标。为了发现和防止非法行为,考虑通过开发监测社交网络的软件来组织对社交网络的监测和防止通过互联网组织的犯罪。本文讨论了网络威胁的类型和针对它们的保护方法,以及在Python环境中监视社交网络的程序,并展示了其结果。根据获得的结果,他考虑了通过识别威胁类型进行预防的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信