ANALYTICAL REVIEW OF METHODS AND APPROACHES FOR IMPLEMENTING PERSONAL DATA PROTECTION SYSTEMS IN ENTERPRISES
Keywords:
data protection, personal data, information security, security tools, protection technologies, encryption, IDS/IPS systems, identity and access management (IAM), antivirus software, firewalls, multi-factor authentication (MFA), data backup, DLP systems, SIEM systems, incident management, access audit, employee training, data leakage prevention, cyber threats, confidential information protection.Abstract
The article provides an analysis of the methods and technologies used for building personal data protection systems (PDPS) in enterprises. Various approaches to their implementation are reviewed and proposed. Special attention is given to both the legal regulations in the Kyrgyz Republic and international standards. Examples of effective solutions for data protection are presented, along with discussions on risk management strategies related to data leakage and unauthorized access.
References
1. Закон Кыргызской Республики «О персональных данных» от 14 апреля 2008 года № 58.
2. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).
3. Указ Президента Кыргызской Республики «О мерах по защите персональных данных» от 1 марта 2017 года.
4. Лившиц В.М., Шестаков Д.В. Информационная безопасность организаций. – М.: Юнити-Дана, 2020. – 320 с.
5. Сорокин В.А. Методы защиты информации. – СПб.: Питер, 2019. – 456 с.
6. Stallings W. Cryptography and Network Security: Principles and Practice. – Pearson, 2020. – 816 p.
7. Журавлев В.П. Защита информации в корпоративных системах. – М.: Горячая Линия – Телеком, 2019. – 384 с.
8. Williams, P. and Wills, L. Security Information and Event Management (SIEM) Implementation. – McGraw-Hill, 2018.
9. Cuppens, F., & Miege, A. Intrusion Detection Systems. – Springer, 2021. – 512 p.
10. Kizza, J.M. Guide to Computer Network Security. – Springer, 2020. – 535 p.
11. ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection — Information security management systems — Requirements.
12. Harris S. CISSP All-in-One Exam Guide. – McGraw-Hill Education, 2019. – 1456 p.
13. Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. – Wiley, 2020. – 1088 p.
14. Bishop, M. Introduction to Computer Security. – Addison-Wesley, 2020. – 786 p.
15. Бойко, В. В. (2021). Информационная безопасность. М.: Юрайт. http://www.publishing-vak.ru/file/archive-economy-2021-2/16-ershova-boiko.pdf
16. Снитко, С. А. (2020). Управление информационной безопасностью. https://rusneb.ru/catalog/000199_000009_010930271/
17. Kaufman, C., Perlman, R., & Speciner, M. (2016). Network Security: Private Communication in a Public Internet. Prentice Hall. (https://www.pearson.com/store/p/network-security-private-communication-in-a-public-internet/P100000323269
18. Symantec Corporation. (2020). Symantec Data Loss Prevention. https://cortex.marketplace.pan.dev/marketplace/details/SymantecDLP/#:~:text=Symantec%20Data%20Loss%20Prevention%20(DLP),of%20your%20sensitive%20corporate%20data
19. Cisco Systems. (2019). Cisco Firepower Next-Generation Firewall. https://www.cisco.com/c/dam/m/ru_ua/campaigns/security-hub/pdf/datasheet-c78-736661.pdf
20. Microsoft Corporation. (2021). Microsoft Azure Active Directory. https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2024 Корякин С.В., Верзунов С.Н., Вейс П.Л., Оруналиева A.К.
This work is licensed under a Creative Commons Attribution 4.0 International License.