OPTIMIZING DATA PROTECTION: PREVENTIVE AND REACTIVE STRATEGIES

Authors

DOI:

https://doi.org/10.32689/maup.it.2024.4.3

Keywords:

data protection, optimization, preventive strategies, reactive strategies, cybersecurity, security policies

Abstract

The article examines key aspects of optimizing data protection in the face of ever-increasing cyber threats. The authors identify two main categories of strategies: preventive, which are aimed at preventing incidents, and reactive, which focus on responding to threats that have already occurred. The purpose of the work is to study the main approaches to ensuring data security in modern information systems. The article considers effective preventive strategies to prevent leaks or unauthorized access to information, as well as reactive strategies to restore systems and minimize the consequences of cyber incidents. Methodology. Review of scientific publications related to data protection strategies. Study of regulatory documents on information protection. This will allow to establish the current state of the problem and determine the most effective preventive and reactive protection methods. Analysis of preventive strategies using the method of comparing different approaches to data protection. Evaluation of reactive protection strategies such as, incident recovery, attack monitoring and incident response. Scientific novelty. Development of a methodology for optimizing costs for cybersecurity measures. This allows determining the optimal balance between proactive and reactive security measures. Introduction of a comprehensive assessment that takes into account not only the costs of implementing technologies, but also the economic effect of reducing security risk and rapid recovery after attacks. Conclusions. The study's findings highlight the importance of a comprehensive approach to data protection that combines preventive and reactive measures, ensuring a more robust level of information security, as well as reducing risks in a rapidly changing cyberspace. This may be useful for professionals in the fields of information technology, data security, and strategic management.

References

Куперштейн Л., Луцишин Г., Кренцін М. Інформаційна технологія моніторингу безпеки даних програмного забезпечення. Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка», 2024. 3(23), 71–84. URL: https://doi.org/10.28925/2663-4023.2024.23.7184

Штонда Р., Черниш Ю., Терещенко Т., Терещенко К., Цикало Ю., Поліщук С. Класифікація та методи виявлення фішингових атак. Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка», 2024. 4(24), 69–80. URL: https://doi.org/10.28925/2663-4023.2024.24.6980

Alam, Mohammad Nazmul, et al. Phishing attacks detection using machine learning approach. In: 2020 third international conference on smart systems and inventive technology (ICSSIT). IEEE, 2020. 1173–1179.

Barreto C., Koutsoukos X. Design of Load Forecast Systems Resilient Against Cyber-Attacks. In Lecture Notes in Computer Science 2019. (pp. 1–20). Springer International Publishing. URL: https://doi.org/10.1007/978-3-030-32430-8_1

CHANTI S., CHITHRALEKHA T. A literature review on classification of phishing attacks. International Journal of Advanced Technology and Engineering Exploration, 2022, 9.89: 446–476.

Christophe Feltus. Optimizing Data Strategy for Automated Mitigation Response Security – Ransoware Case Study URL: https://www.researchgate.net/publication/380464686_Optimizing_Data_Strategy_for_Automated_Mitigation_Response_Security_-_Ransoware_Case_Study

Detecting Phishing Emails URL: https://meu.edu.jo/uploads/1/590422b4d5dd81.pdf Detecting Phishing Emails Using Machine Learning Techniques

Feltus C. Learning algorithm recommendation framework for IS and CPS security: Analysis of the RNN, LSTM, and GRU contributions. International Journal of Systems andSoftware Security and Protection (IJSSSP) 13, no. 1 (2022): 1–23.

Holmes D., Papathanasaki M., Maglaras L., Ferrag M. A., Nepal S., Janicke H. (2021, September). Digital twins and cyber security – solution or challenge? 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Preveza, Greece. URL: https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566277

Optimizing IT Support: Proactive vs. Reactive Strategies. URL: https://vastitservices.com/blog/optimizing-itsupport-proactive-vs-reactive-strategies/

Published

2024-12-30

How to Cite

ВАВРИК, Т., & ГОБИР, Л. (2024). OPTIMIZING DATA PROTECTION: PREVENTIVE AND REACTIVE STRATEGIES. Information Technology and Society, (4 (15), 21-25. https://doi.org/10.32689/maup.it.2024.4.3