ANALYSIS OF METHODS DATA SECURITY

Authors

DOI:

https://doi.org/10.17721/ISTS.2020.4.53-57

Keywords:

start-up, information interaction, customer journey map, forecasting

Abstract

The article analyzes the main methods of information protection, from which it is possible to conclude that no method of data protection is ideal for all situations. It is important to choose an enterprise solution that provides comprehensive functionality, a flexible range of data protection options, broad support for platform and data types, and proven success in production implementations. The choice of method of information protection should take into account many circumstances that may arise during the implementation of a particular method. Due to the variety of data generated today, in addition to increasing the number of new platforms, flexibility can be a critical aspect of the data protection solution. A careful review of the requirements should make it easy to compare them with the relevant data protection methods, and it is necessary to make sure that the solution includes everything necessary to meet these requirements. Choosing the right method of information protection becomes much more difficult when more complex environments with many conflicting variables are involved, as it must support several options to provide flexibility to protect and meet data confidentiality, integrity and availability requirements. Only the integrated use of different measures can ensure reliable protection of information, because each method or measure has weaknesses and strengths. In some situations, internal security policies or regulations may forcibly change one method of data protection to another. Today, most standards, such as PCI DSS and HIPAA, allow a combination of the aforementioned methods, but these standards usually lag behind available or new data protection technologies. The set of methods and means of information protection includes software and hardware, protective transformations and organizational measures. A set of such methods, which are focused on protecting information, should protect them depending on whether the information is stored, moved or copied, accessed or used.

Downloads

Download data is not yet available.

References

Averchenkov VI Information security audit.– M.FLINTA, 2016 – 269 p.с.

Gvozdeva, T.V. Design of information systems / T.V. Gvozdev, B.A. Ballod. – M .: Fenix, 2009. – 512 p.

Protegrity. Methods of Data Protection [Electronic resource] / Protegrity Access mode to the resource: http://sfbay.issa.org/comm/presentations/2015/Methods%20of%20Data%20Protection%20White%20Paper%20-%20Protegrity%20Sept%202015.pdf.

Goodson, John A Practical Guide to Data Access (+ DVD-ROM) / John Goodson, Rob Steward. – M .: BHV Petersburg, 2013. – 304 p. Голицына, О. Л. Основы алгоритмизации и программирования / О. Л. Голицына, И. И. Попов. – М.: Форум, 2010. – 432 c.

Pollis, Gary Software Development. Based on the Rational Unified Process (RUP) / Gary Pollis et al. – M .: Binom-Press, 2011. – 256 p.

Vsyakikh, Ye.I. Practice and problems of modeling business processes. – M .: Book on Demand, 2008. – 246 p.

Internet Engineering Task Force. JSON Web Token (JWT) [Electronic resource] / Protegrity – Access mode to the resource: https://tools.ietf.org/html/rfc7519.

Published

2020-12-29

How to Cite

ANALYSIS OF METHODS DATA SECURITY. (2020). Information Systems and Technologies Security, 1(3-4), 52-56. https://doi.org/10.17721/ISTS.2020.4.53-57