ANALYTICAL REVIEW OF METHODS AND APPROACHES FOR IMPLEMENTING PERSONAL DATA PROTECTION SYSTEMS IN ENTERPRISES

Authors

  • Koryakin S.V. Institute of Information Technologies, Kyrgyz State Technical University named after I. Razzakov
  • Verzunov S.N. Institute of Machine Science, Automation, and Geomechanics of the National Academy of Sciences of the Kyrgyz Republic
  • P.L. International University of Central Asia
  • Orunalieva A.K. Institute of Information Technologies, Kyrgyz State Technical University named after I. Razzakov

Keywords:

data protection, personal data, information security, security tools, protection technologies, encryption, IDS/IPS systems, identity and access management (IAM), antivirus software, firewalls, multi-factor authentication (MFA), data backup, DLP systems, SIEM systems, incident management, access audit, employee training, data leakage prevention, cyber threats, confidential information protection.

Abstract

The article provides an analysis of the methods and technologies used for building personal data protection systems (PDPS) in enterprises. Various approaches to their implementation are reviewed and proposed. Special attention is given to both the legal regulations in the Kyrgyz Republic and international standards. Examples of effective solutions for data protection are presented, along with discussions on risk management strategies related to data leakage and unauthorized access.

References

1. Закон Кыргызской Республики «О персональных данных» от 14 апреля 2008 года № 58.

2. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).

3. Указ Президента Кыргызской Республики «О мерах по защите персональных данных» от 1 марта 2017 года.

4. Лившиц В.М., Шестаков Д.В. Информационная безопасность организаций. – М.: Юнити-Дана, 2020. – 320 с.

5. Сорокин В.А. Методы защиты информации. – СПб.: Питер, 2019. – 456 с.

6. Stallings W. Cryptography and Network Security: Principles and Practice. – Pearson, 2020. – 816 p.

7. Журавлев В.П. Защита информации в корпоративных системах. – М.: Горячая Линия – Телеком, 2019. – 384 с.

8. Williams, P. and Wills, L. Security Information and Event Management (SIEM) Implementation. – McGraw-Hill, 2018.

9. Cuppens, F., & Miege, A. Intrusion Detection Systems. – Springer, 2021. – 512 p.

10. Kizza, J.M. Guide to Computer Network Security. – Springer, 2020. – 535 p.

11. ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection — Information security management systems — Requirements.

12. Harris S. CISSP All-in-One Exam Guide. – McGraw-Hill Education, 2019. – 1456 p.

13. Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. – Wiley, 2020. – 1088 p.

14. Bishop, M. Introduction to Computer Security. – Addison-Wesley, 2020. – 786 p.

15. Бойко, В. В. (2021). Информационная безопасность. М.: Юрайт. http://www.publishing-vak.ru/file/archive-economy-2021-2/16-ershova-boiko.pdf

16. Снитко, С. А. (2020). Управление информационной безопасностью. https://rusneb.ru/catalog/000199_000009_010930271/

17. Kaufman, C., Perlman, R., & Speciner, M. (2016). Network Security: Private Communication in a Public Internet. Prentice Hall. (https://www.pearson.com/store/p/network-security-private-communication-in-a-public-internet/P100000323269

18. Symantec Corporation. (2020). Symantec Data Loss Prevention. https://cortex.marketplace.pan.dev/marketplace/details/SymantecDLP/#:~:text=Symantec%20Data%20Loss%20Prevention%20(DLP),of%20your%20sensitive%20corporate%20data

19. Cisco Systems. (2019). Cisco Firepower Next-Generation Firewall. https://www.cisco.com/c/dam/m/ru_ua/campaigns/security-hub/pdf/datasheet-c78-736661.pdf

20. Microsoft Corporation. (2021). Microsoft Azure Active Directory. https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id

Downloads

Published

2024-12-18

Issue

Section

INFORMATION TECHNOLOGY AND INFORMATION PROCESSING

Categories