ЗАХИСТ ВІД НЕСАНКЦІОНОВАНОГО ДОСТУПУ
Ключові слова:
методи захисту інформаційних систем, кіберзагрози, хмарні середовища, штучний інтелектАнотація
This paper explores modern methods for securing information systems against unauthorized access. As cyber threats grow, ensuring data confidentiality, integrity, and availability is essential. The study highlights the need for a comprehensive security strategy combining organizational policies, technical controls, and advanced software. It addresses challenges in cloud environments and the use of AI for anomaly detection. Legal frameworks like GDPR and national standards are also examined. Effective protection requires continuous monitoring, strong access controls, and proactive threat response. Multi-layered defenses—such as encryption, two-factor authentication, and behavioral analytics – improve resilience against both internal and external threats.
Посилання (Бібліографія)
Serhii Yevseiev, Volodymir Ponomarenko, Oleksandr Laptiev, Oleksandr Milov and others. Synergy of building cybersecurity systems. Kharkiv. Publisher PC TECHNOLOGY CENTER. 2021 – 188 с. ISBN 978-617-7319-31-2 (on-line). ISBN 978-617-7319-32-9 (print). DOI: https://doi.org/10.15587/978-617-7319-31-2
Laptiev O., and other. Methodological aspect of ensuring state security in the mind threats. University of Security Management in Koshitze. Slovakia. 2023. 272 p. ISBN 978-80-8185-058-5. (Charter 10. pp.137-150).