Статті в журналах з теми "Data security and protection"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Data security and protection.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Data security and protection".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

MALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

A. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ignisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.

Повний текст джерела
Анотація:
The article analyzes the main methods of information protection, from which it is possible to conclude that no method of data protection is ideal for all situations. It is important to choose an enterprise solution that provides comprehensive functionality, a flexible range of data protection options, broad support for platform and data types, and proven success in production implementations. The choice of method of information protection should take into account many circumstances that may arise during the implementation of a particular method. Due to the variety of data generated today, in addition to increasing the number of new platforms, flexibility can be a critical aspect of the data protection solution. A careful review of the requirements should make it easy to compare them with the relevant data protection methods, and it is necessary to make sure that the solution includes everything necessary to meet these requirements. Choosing the right method of information protection becomes much more difficult when more complex environments with many conflicting variables are involved, as it must support several options to provide flexibility to protect and meet data confidentiality, integrity and availability requirements. Only the integrated use of different measures can ensure reliable protection of information, because each method or measure has weaknesses and strengths. In some situations, internal security policies or regulations may forcibly change one method of data protection to another. Today, most standards, such as PCI DSS and HIPAA, allow a combination of the aforementioned methods, but these standards usually lag behind available or new data protection technologies. The set of methods and means of information protection includes software and hardware, protective transformations and organizational measures. A set of such methods, which are focused on protecting information, should protect them depending on whether the information is stored, moved or copied, accessed or used.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Qureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Highland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Atri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.

Повний текст джерела
Анотація:
Purpose: This research paper aims to enhance Big Data security by implementing comprehensive data protection measures, focusing on securing data at rest and in transit. In the era of Big Data, organizations handle vast quantities of data characterized by high velocity, volume, and variety, which complicates management and increases security risks. Methodology: The study examines various data protection strategies, including encryption, access control, data masking, immutable storage, tokenization, and physical security for data at rest. For data in transit, it explores encryption protocols, secure transfer methods like SSH and TLS, VPNs, Zero Trust architecture, and secure APIs. These methods are crucial for safeguarding sensitive information and preventing unauthorized access. Findings: The findings highlight common security challenges in Big Data, such as data breaches, unauthorized access, and integrity issues. The study emphasizes the need for robust protection measures and offers a comprehensive view of the data security landscape. Implementing these strategies helps organizations safeguard sensitive information and ensure compliance with international data protection regulations, enhancing their overall security posture. Unique contribution to theory policy and practice: This paper contributes to theory, policy, and practice by advocating comprehensive data protection strategies. It stresses the importance of continuous monitoring and regulatory compliance, providing practical insights into best practices and technologies that protect Big Data. The research supports developing robust data protection policies and practices, advancing knowledge in Big Data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Повний текст джерела
Анотація:
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Reddy Gopireddy, Ravindar, and Sandhya Rani Koppanathi. "Post - Breach Data Security: Strategies for Recovery and Future Protection." International Journal of Science and Research (IJSR) 7, no. 12 (December 5, 2018): 1609–14. http://dx.doi.org/10.21275/sr24731204000.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Fang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.

Повний текст джерела
Анотація:
While the flash becomes main data storage medium, user authentication is normally used as the most important method to safeguard the securities of the data. But ii could do nothing to prevent illegal copies of legitimate users and illegal hard copies. This paper introduces a new type of data security protection technology. A method of generating special character code was first proposed. The code is regarded as the flash identity. The authentication of that identity can be applied to effectively recognize the illegal data copies and protect the data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Anita, Dombale. "Data Rakshak." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (November 30, 2023): 1978–85. http://dx.doi.org/10.22214/ijraset.2023.56957.

Повний текст джерела
Анотація:
Abstract: Information security is essential as data exchange moves towards an electronic system. In today's visual communication system, picture, text, and video protection are crucial. Unauthorized uses of private videos, text, and image data must be prevented. It can be difficult to find and identify unauthorized users. Several researchers have proposed several methods for protecting the transfer of texts. We created an encryption and decryption technique with security in mind. We have primarily concentrated on data security, which may be utilized by security agencies, the IT sector, SMBs, the healthcare industry, governmental organizations, the legal industry, financial and banking institutions, etc
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Bolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.

Повний текст джерела
Анотація:
Introduction: to ensure the necessary level of personal data security in computer systems, it is advisable to create an information security management system that would allow you to help choose protective measures for certain input data. Purpose: to develop an algorithm for the personal data protection model that allows considering a set of input factors for making decisions on information security. Methods: it is proposed to use the fuzzy inference apparatus as a mathematical apparatus for describing such a situation. The main advantage of using this mathematical approach in modeling a control system is the description of conditions and methods for solving problems under uncertainty. Results: when building an information security management system, defined a set of rules and study the influence of changes in input variables on a set of protective measures. The model developed on the basis of this algorithm using fuzzy inference identifies the impact of information security threats on decision-making on the choice of measures to protect personal data in a computer system. The result of threat modeling is also planning that illustrate the relationship between the input and output parameters of the model. These planes allow you to determine the management decision on the choice of measures depending on the values of the selected parameters. The paper proposes three thresholds for the values of each of the protective measures, which determine the need for the measures used to neutralize the simulated threats. The influence of input variables on the output values of the constructed model identify a change in the distribution of the terms of the membership functions of the input parameters, the change of which can significantly affect the final decision on information security management. Discussion: the results of the work indicate the need for an adequate description of both the input variables and the response of the output variables of the model to the input variables in order to take effective measures to protect information.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (April 15, 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Повний текст джерела
Анотація:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notification to the APD are the general requirements for the processing of personal data, without prejudice to the principles and other specific requirements applicable to sensitive data. Only health professionals registered in the respective professional associations are qualified to process health data, and must observe professional secrecy. Data holders are assured the exercise of their rights to information, access, rectification, updating and deletion of their data. Security measures must be implemented to ensure confidentiality, integrity and availability of information. In conclusion, in Angola there is no prohibition on the processing of personal data, what the legislator imposes is that it be done with transparency and legality, aiming at protecting its holders from situations of vulnerability, including stigmatization, discrimination, observing dignity of the human person as one of the fundamental principles of ethics, especially in scientific research.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Livshitz, Ilya. "Assessment of the Impact of General Data Protection Regulation on Enterprise Security in the Russian Federation." Voprosy kiberbezopasnosti, no. 4(38) (2020): 66–75. http://dx.doi.org/10.21681/2311-3456-2020-04-66-75.

Повний текст джерела
Анотація:
Abstract The purpose of the study is to analyze the existing requirements for personal data security and assess the impact of these requirements on the enterprises security in the Russian Federation. Research method: the problem of ensuring the security of personal data in accordance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation is investigated. The article analyzes the possible risks of interrupting the normal activities of enterprises in the Russian Federation due to violations of these requirements for personal data protection and the imposition of significant fines by international regulators. Numerical relationships are estimated between the amount of fines for violations of established requirements, including General Data Protection Regulation, and the cost of creating an effectiveness personal data protection system. Estimates of the permissible degree of influence of the General Data Protection Regulation requirements on the enterprises security in the Russian Federation are obtained. Research result: a study and comparison of possible penalties for violation of compliance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation was performed. Risk assessments of sanctions for violation of the established requirements for personal data protection were obtained. The analysis of the cost of preparing a personal data protection system for compliance with the requirements of the General Data Protection Regulation was performed. Based on the data obtained, examples of calculating the degree of maturity of the security system are presented – based on the ratio of the share of the budget allocated for security in relation to the cost of creating an effectiveness personal data protection system and based on the ratio of the amount of the fine for violation of the established requirements. The importance of accounting for the costs of personal data security to ensure the security of enterprises in the Russian Federation, taking into account the requirements of the General Data Protection Regulation, is shown
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Swanzy, Percy Nathan, Arnold Mashud Abukari, and Edward Danso Ansong. "Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud." Current Journal of Applied Science and Technology 43, no. 6 (May 13, 2024): 61–77. http://dx.doi.org/10.9734/cjast/2024/v43i64387.

Повний текст джерела
Анотація:
Data stored in the cloud is particularly vulnerable to attacks, especially when at rest or in transit. This makes the security of data in the cloud in terms of its integrity, confidentiality and availability a major security concern. While existing studies on cloud data security have garnered attention from cybersecurity researchers, there has been limited focus on developing a comprehensive data security framework that integrates both technical and social measures. The general objective of the study was to develop a data security framework for protecting data at rest and data in transit in the cloud. The qualitative research approach was chosen using interviews, archival records and physical artefacts as the source of data for the study. Using the purposive sampling technique, ten cyber security experts within the banking sector with not less than five years of practice were selected. Thematic analysis was used in analysing the collected data which led to the identification of the factors for the development of the framework. The study developed the framework for protecting data at rest and data in motion in the cloud based on the encryption technologies, installation of firewalls and antivirus as well as access control techniques. First Homomorphic encryption technologies were implemented in the framework to secure both storage devices and web connections. Other security factors were installation of firewall and antivirus. The findings revealed that access and usage control strategies integrate user identification and authentication. Additionally, these strategies incorporate safeguards for confidentiality, data integrity, and non-repudiation, securing both data-at-rest and data-in-motion. The findings also indicated that audit trails provide electronic records that offer security support documentation and history that is used to authenticate operational actions and mitigate challenges with non-compliance. Additionally, the findings emphasized the importance of social strategies such as staff training and industry collaboration in enhancing data security. These strategies aim to raise awareness of security threats and inform best practices for securing organizational data. The study recommends that banks consider both technical and social aspects when implementing data protection security measures especially implementing homomorphic encryption to secure data and implement Cyber Security training policies.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Viana da Silva, Marcos Vinicius, Erick Da Luz Scherf, and Jose Everton Da Silva. "THE RIGHT TO DATA PROTECTION VERSUS “SECURITY”." Revista Direitos Culturais 15, no. 36 (April 27, 2020): 209–32. http://dx.doi.org/10.20912/rdc.v15i36.18.

Повний текст джерела
Анотація:
The protection of personal data in the cyberspace has been an issue of concern for quite some time. However, with the revolutions in information technology, big data and the internet of things, data privacy protection has become paramount in an era of free information flows. Considering this context, this research intends to shine a light on the experience of Brazil regarding data privacy protection, through the analysis of a brand new bill passed by Congress: the Brazilian General Personal Data Protection Act. Our assessment of the legislation was made from the perspective of a human rights-based approach to data, aiming to analyze both advancements, limitations and contradictions of the rights-discourse in the LGPD. Our main conclusions were that the (public and national) security rhetoric, also present in the bill, can create a state of exception regarding the processing of personal data of those considered “enemies of the state”, which may result in violations of fundamental rights and procedural guarantees.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Pounder, Chris. "Security and the new Data Protection law." Computers & Security 17, no. 2 (January 1998): 124–28. http://dx.doi.org/10.1016/s0167-4048(97)81981-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Saxby, Stephen. "Data protection act 1984: Security and accuracy of data." Computer Law & Security Review 2, no. 2 (July 1986): 14. http://dx.doi.org/10.1016/0267-3649(86)90065-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Williamson, J. D. "Data protection and the clinician: guidelines on data security." BMJ 291, no. 6507 (November 23, 1985): 1516–19. http://dx.doi.org/10.1136/bmj.291.6507.1516.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Reddy Gopireddy, Ravindar. "AI-Powered Security in Cloud Environments: Enhancing Data Protection and Threat Detection." International Journal of Science and Research (IJSR) 10, no. 11 (November 5, 2021): 1568–72. http://dx.doi.org/10.21275/sr24731135001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Ahmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (November 24, 2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.

Повний текст джерела
Анотація:
E-government is the use of information and communication technology for public service provision in governance. Nowadays, E-government facilitates transparent, accountable, efficient and all-inclusive governing process for improved service delivery to citizens. However, the emergence of this novel innovation opened up new security vulnerabilities to citizens’ data. Comprehensive security plan for secure linkage of people, process and technology is crucial to ensure that data and network channel is protected from potential security threats. The purpose of this study is to provide a security model for protection of citizens’ data in E-government system. This paper propose information security stack, a data protection model for efficient data protection in E-government system. The information security stack comprised of citizens’ identification, authentication of identities, data confidentiality and data integrity in E-government system. First, this paper classified citizens’ identification into international, national and purposive identification. Second, acceptable form of identification for authentication of identities in E-government system depends on the security restriction imposed on the requested information. Consequently, user authentication is classified into single factor authentication, two-factor authentication and multifactor authentication depending on the use case in the E-government system. Third, data confidentiality implemented by data encryption is an information security goal for preserving the privacy of information in E-government system. The authors categorised data encryption in E-government into symmetric encryption and asymmetric encryption. Finally, ensuring the accuracy and completeness of citizens’ data is crucial for preserving data integrity in E-government system. This can be achieved by digital signature, an electronic version of handwritten signature.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Nugraha, Arya Adhi, and Asyahri Hadi Nasyuha. "Integrating ISO 27001 and Indonesia's Personal Data Protection Law for Data Protection Requirement Model." Journal of Information Systems and Informatics 6, no. 2 (June 14, 2024): 1052–69. http://dx.doi.org/10.51519/journalisi.v6i2.754.

Повний текст джерела
Анотація:
This research explores the integration of ISO/IEC 27001:2022 with Indonesia's Personal Data Protection (PDP) Law to establish a robust framework for data protection and information security within organizations operating in Indonesia. The research addresses the challenges of aligning the comprehensive information security management systems (ISMS) standard of ISO/IEC 27001:2022 with the specific legal requirements of the PDP Law, which governs personal data collection, processing, and protection. Employing the Action Design Research (ADR) methodology, the study involves a thorough review of existing literature, consultations with domain experts, and the development of a structured framework for integration. Key findings highlight the complementary nature of ISO/IEC 27001:2022's risk-based approach and the PDP Law's emphasis on data subject rights, consent management, and breach notification. The integration framework provides organizations with a unified approach to meet both international standards and local regulatory requirements, enhancing overall data protection. The research concludes with insights and recommendations for organizations seeking to navigate the complex landscape of data protection compliance, emphasizing the importance of harmonizing security measures with legal mandates to build a comprehensive and effective data protection strategy.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Knowen, Cosmas, Lamek Ronoh, and Anne Mugalavai. "Prioritizing Personal Data Protection in Insurance Organizations." Journal of Information Security and Cybercrimes Research 6, no. 1 (June 22, 2023): 40–56. http://dx.doi.org/10.26735/enpo6596.

Повний текст джерела
Анотація:
This literature review focuses on the importance of prioritizing personal data security in insurance organizations in the context of Web 2.0 and the fourth industrial revolution. With the increasing use of digital transactions and data sharing, there is a need for improved data security postures to mitigate vulnerability issues. Personal data is a valuable asset that is targeted by malicious individuals, which highlights the importance of establishing proactive and trustworthy security frameworks. The study evaluates the security threats associated with the collection, processing, storage, and retention of personal data in insurance organizations, and examines the legal and technical provisions for its protection. Through an analytical review methodology, this paper highlights the urgent need to establish robust data security measures to ensure that personal data is secure when held in the custody of insurance organizations and personal management information systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Hidayatulloh, Hidayatulloh. "HUMAN RIGHTS AND DATA PROTECTION IN THE DIGITAL FINANCIAL ECOSYSTEM." JHR (Jurnal Hukum Replik) 11, no. 1 (April 1, 2023): 12. http://dx.doi.org/10.31000/jhr.v11i1.8110.

Повний текст джерела
Анотація:
Indonesia passed Law Number 27 of 2022 concerning the Protection of Personal Data, a notable instrument in preventing privacy and data protection rights violations. This paper analyzes the relationship between human rights and personal data protection in digital financial transactions. In the findings of this paper, privacy rights and data protection rights are human rights that are interrelated with one another. Both are essential parts of protecting human honor and dignity. In matters of personal data, leakage and theft are the leading digital security issues in financial institutions, especially banks. The community hopes that Law Number 27 of 2022 can provide protection, especially the security of digital financial transactions that continue to develop in Indonesia.Keywords: human rights, personal data protection, digital finance
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Повний текст джерела
Анотація:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

István, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.

Повний текст джерела
Анотація:
Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines. In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach "Software-Defined Data Protection" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA. While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

John, Nicolas, and Maximilian Wellmann. "Data security management and data protection for video conferencing software." International Cybersecurity Law Review 1, no. 1-2 (October 2020): 39–50. http://dx.doi.org/10.1365/s43439-020-00013-4.

Повний текст джерела
Анотація:
Abstract Corona crisis and video conferencing software – two terms that now belong together. However, the demands controllers have on video conferencing software can quickly reach the limits of data protection regulations. In recent years, the progressive development of video conferencing software has already excited many users and led to significant growth. In ad hoc situations, like the Corona pandemic, issues regarding data protection are all too often neglected. This is fatal considering the fact that the implementation of video conferencing software is accompanied by a large number of data protection and security issues that must be addressed and weighed up by the controller. At first glance, technically feasible solutions can quickly turn out to be “Trojan horses” and pose a serious threat to personal data. Therefore, the selection, set-up and use of data protection-compliant video conferencing software is of great importance for controllers. This article aims to examine relevant questions regarding data protection and security management from a European legal perspective. In particular, the detailed analysis of the requirements of the General Data Protection Regulation (GDPR) as well as the practical consequences for the controller should provide practicians an overview of the legal problems associated with the implementation and use of video conferencing software.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Dai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.

Повний текст джерела
Анотація:
Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.

Повний текст джерела
Анотація:
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the United States Federal Trade Commission has been using its power under the United States consumer protection regime to regulate these problems. The Australian Competition and Consumer Commission (ACCC), on the other hand, has yet to bring civil or criminal proceedings for online privacy or data security breaches, which indicates a reluctance to employ the Australian Consumer Law (‘ACL’) in this field.1 Recent legislative action instead points to a greater application of the specifically targeted laws under the Privacy Act 1988 (Cth) (‘Privacy Act’), and the powers of the Office of the Australian Information Commissioner (OAIC), to protect consumer privacy and data security. This article contends that while specific legislation setting out, and publicly enforcing, businesses’ legal obligations with respect to online privacy and data protection is an appropriate regulatory response, the ACL's broad, general protections and public and/or private enforcement mechanisms also have a role to play in protecting consumer privacy and data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Bogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (May 1, 2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.

Повний текст джерела
Анотація:
The rapid and continuous development of information technologies that encompasses almost all spheres of social life, imposes the key issue of protecting the privacy personal data, the issue of their availability, the way of their storage, processing, transmission and use. The contemporary concept of privacy puts emphasis on information control, security and data protection in computer information systems. Protection of privacy primarily concerns the issue of protection against abuse, fraud, embezzlement and deliberate or accidental damage. This paper covers several key issues: what are the mechanisms for protecting personal data in documents; is it feasible to achieve higher security of computer systems in terms of data protection; is it possible to limit the distribution of certain types of data (medical reports, financial institutions, schools); what is done regarding data protection in terms of establishing laws, regulations and standards. From the point of view of archivists and archival staff in the era of digitalization of archival material when it becomes accessible and available for use, the protection of personal data in documents is certainly an issue that deserves special attention and consideration. The paper shall provide an overview on the up to date achievements in this field within the archival services in our country and abroad.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Гулов, Владимир Павлович, Виктор Анатольевич Хвостов, Владимир Петрович Косолапов, and Галина Владимировна Сыч. "PERSONAL DATA PROTECTION FEATURES IN MOBILE MEDICINE." СИСТЕМНЫЙ АНАЛИЗ И УПРАВЛЕНИЕ В БИОМЕДИЦИНСКИХ СИСТЕМАХ, no. 3() (September 30, 2020): 171–76. http://dx.doi.org/10.36622/vstu.2020.19.3.022.

Повний текст джерела
Анотація:
Проведен анализ особенностей применения медицинских технологий, использующих мобильные приложения для повышения эффективности оказания медицинских услуг пациентам (мобильная медицина). На основе анализа уязвимостей характерных для мобильных систем и уязвимости медицинских информационных систем с мобильным доступом пациентов и сотрудников медицинской организации, новых атак, направленных на уязвимости мобильных технологий и протоколов сотовой связи и беспроводного доступа скорректированы цели безопасности и контекст безопасности организации. Для решения задач безопасности, возникающих при использовании технологий мобильной медицины, предложены типовая архитектура безопасности, способы защиты информации и проведен анализ возможных технических средств защиты. Целью архитектуры безопасности мобильной медицины является обеспечение конфиденциальности, целостности и доступности информационных ресурсов медицинской организации при доступе к ней с мобильных станций (смартфонов, планшетов, смарт устройств и т.п.). Основой архитектуры безопасности мобильной медицины могут являться средства обеспечения безопасности, такие как виртуальные частные сети, системы обнаружения вторжений, системы слежения за действиями пользователя, а также такие средства защиты информации как менеджер мобильных устройств и менеджер мобильных приложений The analysis of the features of the application of medical technologies using mobile applications to improve the efficiency of the provision of medical services to patients (mobile medicine) is carried out. Based on the analysis of vulnerabilities characteristic of mobile systems and the vulnerability of medical information systems with mobile access for patients and employees of a medical organization, new attacks aimed at vulnerabilities of mobile technologies and protocols of mobile communications and wireless access, the security objectives and the security context of the organization are adjusted. To solve the security problems arising from the use of mobile medicine technologies, a typical security architecture, methods for protecting information, and an analysis of possible technical means of protection are proposed. The purpose of the security architecture of mobile medicine is to ensure the confidentiality, integrity and accessibility of information resources of a medical organization when accessing it from mobile stations (Smartphone's, tablets, smart devices, etc.). The basis of the mobile medicine security architecture can be security tools such as virtual private networks, intrusion detection systems, user activity tracking systems, and information security tools such as a mobile device manager and mobile application manager
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Zhurakovskyi, Bohdan, and Oleksiy Nedashkivskiy. "SYSTEM TO COLLECT INFORMATION WHEN TRANSFERRING DATA TO RADIO CHANNELS." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 6–34. http://dx.doi.org/10.28925/2663-4023.2022.15.634.

Повний текст джерела
Анотація:
This article is devoted to solving the problem of information protection in radio channels, by applying comprehensive measures to protect against possible attacks aimed at intercepting and substituting transmitted data. The aim of the work is to analyze the security of wireless networks, identify methods for their protection and create a model for protecting wireless networks. In order to achieve this goal, the following list of tasks was performed: the existing solutions in the field of information protection through radio networks were analyzed; the description of the offered developed model is made; algorithms, experiments, experiments of this model are described. A means of protecting information through radio networks has been developed, the application of which has a significant increase in the level of information security in the radio channel. The practical value of this development is that the theoretical and practical results are recommended for implementation in organizations that use the radio channel to transmit confidential information with high security requirements
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Adhikari, Sanjaya. "Necessity of Big Data Security and its Relation to National Security." Unity Journal 5, no. 1 (March 25, 2024): 1–14. http://dx.doi.org/10.3126/unityj.v5i1.63137.

Повний текст джерела
Анотація:
Many government organizations like the Ministry of Home Affairs, the Department of Passport, Public Service Commission, Department of Transport Management, Election Commission of Nepal, hospitals, etc. are increasingly relying on data-centric services as the stored data helps to deliver the services effectively and efficiently. Such services are widespread due to increased internet usage, mobile devices, and network-based activities. The rapid expansion of technology usage has led to a corresponding shift in governance towards data-driven services. While adopting the data-driven services it brings forth a critical concern about the security and maintaining confidentiality of the citizens. The paper analyzes the existing policies, laws, and bylaws pertaining to data security and protection. It explores the challenges that exist for data security and protection. Furthermore, the paper identifies the necessity of big data security and its impact on national security due to data theft and breaches. The study has been undertaken by the use of secondary sources of information. While undertaking the research, the paper has delved into secondary sources; encompassing government policies, acts, regulations, reports and directives, international research articles, and views of cyber security experts. The paper has underscored the necessity of big data security measures and has identified the consequences that could be caused due to the inadequate security measures of the data as well as highlighted the importance of data privacy. The study contributes to the broader discourse on protecting data and its relation to national security.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

石, 飞杰. "Citizen Data Security Protection from the Perspective of “DiDi” Security Review." Open Journal of Legal Science 09, no. 06 (2021): 663–69. http://dx.doi.org/10.12677/ojls.2021.96095.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Amarendra Reddy, P., Sheikh Gouse, and P. Bhaskara Reddy. "Security and Privacy Mechanisms of Big Data." International Journal of Engineering & Technology 7, no. 4.39 (December 13, 2018): 730–33. http://dx.doi.org/10.14419/ijet.v7i4.39.26264.

Повний текст джерела
Анотація:
Big Data advances in three key areas like storage, processing and analysis. Hadoop architecture is produced to store extensive measure of data through adaptable parallel handling with speed to get the outcomes. Organizations must guarantee that every single big data bases are resistant to security dangers and vulnerabilities. Amid data gathering, all the important security assurances, for example, continuous administration should to be satisfied. Remembering the big size of big data, Organizations should to recollect the way that overseeing such data could be troublesome and requires uncommon endeavors. Be that as it may, making every one of these strides would help keep up buyer protection. The Security and Privacy challenges for Big Data might be sorted out on big data community. Securing the framework of big data frameworks includes Securing appropriated calculations and data stores. Securing the data it is of vital significance, so we need to guarantee that data scattering is security saving and that touchy data is ensured using cryptography and granular access control. Overseeing tremendous volumes of data requires adaptable and conveyed answers for Securing data stores as well as empowering effective reviews and examinations of data provenance. At long last, the streaming data that is rolling in from various endpoints must be checked for respectability and can be utilized to perform continuous examination for security episodes to guarantee the strength of the framework. The explanation behind such ruptures may likewise be that security applications that are intended to store certain measures of data can't the huge volumes of data that the previously mentioned datasets have. Likewise, these security advances are wasteful to oversee dynamic data and can control static data as it were. In this way, only a customary security check can't distinguish security patches for nonstop streaming data. For this reason, we require full-time protection while data streaming and Big Data Analysis. Â
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Michelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.

Повний текст джерела
Анотація:
Data protection, information and IT security became number one priorities in these fast- paced days that top management needs to focus on. A number of IT solutions have been developed on the market to address the security challenges that require prompt actions. These solutions contribute to a control environment that is robust and stand the potential threats. This research describes the framework of governance, risk and compliance and provides an integrated, holistic approach which helps to increase process performance and to ensure that the organization follows its own rules, risk appetite, and complies with external regulations. These systems fulfil a core role in the enterprise’s defense system. This research reviews the features of security packages relevant to IT GRC and provides an overview of the security elements and describes their main characteristics. This review covers the configuration database related to the enterprise business model; the business impact analysis; the risk management-, governance and compliance functions; the data security; the data protection and GDPR; the business continuity management; the network -, IoT - and industrial control system safety, the access - and log management. Embedding these solutions to the business and operations processes strengthens the response of an organization to the various risks and requirements that it faces and reduces the likelihood of major non-compliance or security gaps. Keywords: data protection, GRC software solutions, information security
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Qin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.

Повний текст джерела
Анотація:
In view of the shortcomings of big data security and privacy protection in cloud environment, a big data security architecture was proposed in this paper. Based on blockchain technology and trusted data cloud center, data security architecture adopts the ideas of trusted authentication, intrusion detection, data segmentation, and decentralized storage and applies Amazon AWS log processing service, PairHand user authentication protocol, and Hadoop data analysis framework to realize dig data security and privacy protection in the cloud environment. This paper realizes system initialization and user authentication, hierarchical data storage, decentralized storage, and user security access. The experimental results show that the system architecture can ensure data security and data access speed, which can provide necessary reference for cloud security.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Liu, Xiangguo, Huijun Du, Zhonglong Wang, Jianfei Chen, Jia Peng, and Yue Liu. "Application of Data Security Protection in Smart Grid Based on Computer Electronic Technology." Journal of Physics: Conference Series 2774, no. 1 (July 1, 2024): 012024. http://dx.doi.org/10.1088/1742-6596/2774/1/012024.

Повний текст джерела
Анотація:
Abstract With the continuous improvement of the intelligence level of the State Grid, data security protection in power system automation has become an important challenge for the development of power enterprises. In order to solve this problem, this article is based on the research of power system structure, data types, and the current development status of security protection, combined with computer electronics technology, to conduct in-depth research on data security protection in power system automation, and establish a security protection model based on its theoretical foundation. In order to verify the effectiveness of the model, this paper tested it from three dimensions: data security protection degree, risk processing efficiency, and response time, and compared it with traditional security protection models. The test results show that under different test cases, the maximum protection degree of the data security protection model proposed in this article reaches 95.16%, and the average protection degree is about 91.88%. From the specific test results, it can be seen that the application of data security protection in power system automation based on computer electronic technology has strong operability.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Dahlian Persadha, Pratama, Loso Judijanto, Melly Susanti, and Heru Kreshna Reza. "DATA PRIVACY AND SECURITY PROTECTION STRATEGIES IN LIBRARY ELECTRONIC RESOURCES MANAGEMENT." Holistik Analisis Nexus 1, no. 7 (July 6, 2024): 115–22. http://dx.doi.org/10.62504/nexus742.

Повний текст джерела
Анотація:
Security is a crucial aspect in the digital age, especially in the management and protection of information. As the volume of information processed increases, the need to organize knowledge and provide adequate security becomes more pressing. This research emphasizes the importance of cybersecurity in the context of digital libraries, which must comply with certain technological and regulatory standards to protect user data and guarantee privacy when accessing electronic resources. Libraries face various challenges in protecting personal data on their electronic resources. This research addresses topics such as user privacy, data encryption, access management, and compliance with privacy laws. By addressing these issues comprehensively, libraries can ensure the protection of user privacy while optimizing the benefits of digital resources in today's information environment. The October 2023 cyberattack by a hacker group known as Rhysida on the British Library's internet information system emphasizes the importance of cybersecurity and data privacy for digital libraries. This research aims to provide insights and solutions to address these challenges, ensuring digital libraries can operate securely and efficiently.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Akhramovych, Volodymyr. "DATA PROTECTION AT THE STAGES OF ITS FUNCTIONING." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 149–61. http://dx.doi.org/10.28925/2663-4023.2023.21.149161.

Повний текст джерела
Анотація:
Today, computer and information technologies have covered all areas of the economy. For any modern company, information becomes one of the main resources, the preservation and proper management of which is of key importance for business development and reducing the level of various risks. Ensuring information security is an urgent problem today. Methods of data security depend, among other things, on the state of the data. Taking into account what was said in the article, an attempt was made to consider the methods of data security depending on the data states (data at rest; data being transmitted; used data). So, for example, the state of inactive data (state of rest) is characterized by methods of security: in the form of the use of various encryption methods, access rights management, for example, such as SealPath, the use of MDM tools (they allow you to limit access to certain corporate programs, block access to a device or encrypt data on a mobile phone or tablet), DLP (data leakage prevention), CASB (cloud access security brokers): These are systems that allow us to apply security policies to the documentation we have in cloud systems, for example, such as Office 365, Box, Salesforce, etc. For the state of the transmitted data, typical methods of security in the form of application: encryption of e-mail; managed file transfer, such as MFT technology; DLP technologies provide protection because they can detect if sensitive data is being sent outside the organization; CASB (Cloud Access Security Brokers): refers to data transmitted by an untrusted user for this type of data), it may be blocked for download; SealPath technologies; etc. For the state of the data used, the typical methods of security in the form of application: in a successful case, digital rights protection technologies or IRM are recommended, which is one of the most effective means of data protection, because it combines encryption + permission management + identity control. This security allows documentation to be stored safely in its three states and tracked in any state sequentially.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Moreira da Veiga Pessoa, Bruno. "GENERAL DATA PROTECTION LAW." Revista Gênero e Interdisciplinaridade 4, no. 02 (May 5, 2023): 250–69. http://dx.doi.org/10.51249/gei.v4i02.1327.

Повний текст джерела
Анотація:
Amidst the technological advances brought with the 21st century, the way in which people practice their routine activities has been transformed, all of which have been adapting to the practicality brought about by the digital revolution. In this sense, this article analyzed the ways in which information transactions between users occur and how this data is stored and processed, in view of the General Data Protection Law, which seeks to guarantee greater security in the virtual world so that this environment can become more secure.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Du, Min, Guochao Hu, and Xu Zhang. "Research and Construction of Government Data Security System Based on Hierarchical Protection." Advances in Engineering Technology Research 7, no. 1 (November 7, 2023): 623. http://dx.doi.org/10.56028/aetr.7.1.623.2023.

Повний текст джерела
Анотація:
This article, starting from the background and requirements of government data security system construction, based on the data security protection requirements of the Hierarchical Protection 2.0 series standards (referred to as " Hierarchical Protection 2.0"), delves into the construction approach of the data security system. It elaborates on the construction plan of the government data security system and data security protection strategies, with a focus on aspects like organizational structure, classification and grading, lifecycle, and technical system. This aims to meet the confidentiality, availability, and integrity requirements of data and provide robust support for data security protection in information systems within the field of electronic government.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

K.A., Chicherov, and Norkina A. N. "Confidential Data Protection as a Means of Ensuring Information Security." KnE Social Sciences 3, no. 2 (February 15, 2018): 85. http://dx.doi.org/10.18502/kss.v3i2.1528.

Повний текст джерела
Анотація:
This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Kravchuk, V. "Foreign experience of personal data protection in social networks." Uzhhorod National University Herald. Series: Law 2, no. 78 (August 31, 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.

Повний текст джерела
Анотація:
The article analyzes the protection of personal data based on foreign experience. Social networking has been identified as one of the most prominent cultural phenomena to emerge in the Web 2.0 era. They keep users connected and facilitate the exchange of information between them. The European Union has adopted a new personal data protection system called the General Data Protection Regulation (GDPR). Its main goals include providing individuals with tools to control their personal data, implementing modern standards for the protection of personal information, developing the digital space of the European Union to safeguard personal data, ensuring strict compliance by all parties, and providing legal support for the international transfer of personal information. United States legislative documents related to aspects of data protection and privacy were analyzed, namely: California Consumer Privacy Act (CCPA); Children’s Online Privacy Protection Act (COPPA); Health Insurance Portability and Accountability Act (HIPAA); State data breach notification laws. It is noted that China has a comprehensive legal framework that regulates the protection of personal data, and includes the following legal acts: Personal Information Protection Law (PIPL) and Data Security Law (DSL). Conclusions were made that the urgency and importance of protecting personal data in social networks is due to rapid technological progress, the growth of cyber security threats and the spread of these platforms. By protecting personal data, people can maintain privacy, prevent abuse, maintain user trust, reduce risk, and comply with legal obligations. The issue of ensuring mobility and interoperability in social networks gives particular importance to the protection of personal data, as it relates to this particular data, and not just to technology, as it may be in the telecommunications sector. This requires additional thought and measures to ensure privacy and data security. Therefore, when developing legal protection mechanisms for online social networks, it is necessary to take into account and solve problems related to the protection of personal data.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Parraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.

Повний текст джерела
Анотація:
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Singh, Gurpreet, and Susmita Mishra. "CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 14, 2015): 5887–94. http://dx.doi.org/10.24297/ijct.v14i7.1893.

Повний текст джерела
Анотація:
Scientific computing in the 21st century has evolved from fixxed to distributed work environment. The current trend of Cloud Computing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include security aspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified.This non-existence of global standards and guidelines could be help academics to know the state of practice and formulate better methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions, can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.Â
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Yu, Yang. "Encryption Technology for Computer Network Data Security Protection." Security and Communication Networks 2022 (August 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/1789222.

Повний текст джерела
Анотація:
In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Golubova, Anguelina, and Vera Shumilina. "INFORMATION SECURITY AND DATA PROTECTION IN MODERN SOCIETY." Science & World, no. 2 (June 10, 2022): 6–10. http://dx.doi.org/10.26526/2307-9401-2022-2-6-10.

Повний текст джерела
Анотація:
This article looks at the principles of information security, and the ways in which information can be protected. Examines the problems of protecting information, unauthorised access to it. Demonstrates the types of viruses that exist on the Internet. Offers software to help the user protect themselves from them
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії