PROTECTION AGAINST UNAUTHORIZED ACCESS

Authors

  • Tetiana Laptievа State University of Trade and Economics / Kyiv National University of Trade and Economics,

Keywords:

methods for securing information systems, cyber threats, cloud environments, artificial intelligence (AI)

Abstract

This paper explores modern methods for securing information systems against unauthorized access. As cyber threats grow, ensuring data confidentiality, integrity, and availability is essential. The study highlights the need for a comprehensive security strategy combining organizational policies, technical controls, and advanced software. It addresses challenges in cloud environments and the use of AI for anomaly detection. Legal frameworks like GDPR and national standards are also examined. Effective protection requires continuous monitoring, strong access controls, and proactive threat response. Multi-layered defenses—such as encryption, two-factor authentication, and behavioral analytics – improve resilience against both internal and external threats.

References

Serhii Yevseiev, Volodymir Ponomarenko, Oleksandr Laptiev, Oleksandr Milov and others. Synergy of building cybersecurity systems. Kharkiv. Publisher PC TECHNOLOGY CENTER. 2021 – 188 с. ISBN 978-617-7319-31-2 (on-line). ISBN 978-617-7319-32-9 (print). DOI: https://doi.org/10.15587/978-617-7319-31-2

Laptiev O., and other. Methodological aspect of ensuring state security in the mind threats. University of Security Management in Koshitze. Slovakia. 2023. 272 p. ISBN 978-80-8185-058-5. (Charter 10. pp.137-150).

Downloads

Published

2025-06-03