THE ONGOING BATTLE AGAINST DATA BREACHES AND WAYS TO PROTECT SENSITIVE INFORMATION

ПРОДОЛЖАЮЩАЯСЯ БОРЬБА С УТЕЧКОЙ ДАННЫХ И СПОСОБЫ ЗАЩИТЫ КОНФИДЕНЦИАЛЬНОЙ ИНФОРМAЦИИ
Xoitqulov A.A. Ergashev O.
Цитировать:
Xoitqulov A.A., Ergashev O. THE ONGOING BATTLE AGAINST DATA BREACHES AND WAYS TO PROTECT SENSITIVE INFORMATION // Universum: технические науки : электрон. научн. журн. 2024. 6(123). URL: https://7universum.com/ru/tech/archive/item/17843 (дата обращения: 18.12.2024).
Прочитать статью:

 

ABSTRACT

In the digital era, data breaches are a common concern that can endanger people, companies, and governments. This article examines the ongoing fight against data breaches and outlines the most important defenses against cyberattacks for sensitive data. Organizations may lessen the effects of data breaches and protect their digital assets by recognizing how these breaches are changing and putting strong security measures in place.

АННОТAЦИЯ

В цифровую эпоху утечка данных является распространенной проблемой, которая может поставить под угрозу людей, компании и правительства. В этой статье рассматривается продолжающаяся борьба с утечками данных и обрисовываются наиболее важные меры защиты от кибератак на конфиденциальные данные. Организации могут уменьшить последствия утечек данных и защитить свои цифровые активы, осознав, как эти утечки меняются, и приняв строгие меры безопасности.

 

Keywords: Data breaches, cybersecurity, sensitive information, cyber threats.

Ключевые слова: утечка данных, кибербезопасность, конфиденциальная информация, киберугрозы.

 

INTRODUCTION

For many firms, information leaking poses a major risk. Either employee carelessness or the intentions of other parties may be to blame. Two objectives are involved in the intentional organization of a leak: first, as is common with acts of cyberterrorism, the leak is intended to harm the state, society, or a particular firm; second, the leak is intended to provide the perpetrator with a competitive edge. Although employee carelessness is usually the cause of an unintended leak, it can also have major negative effects. In businesses of all stripes, the development of a system to safeguard information assets against theft should be done expertly and with the use of cutting edge technologies. You must comprehend leakage channels, how to stop them, and the specifications of contemporary security systems in order to do this.

MAIN PART

One of the major issues facing any business is information leakage. There are several factors that increase the risk of intellectual property theft, including employee negligence, outside parties' malevolent intent, and unintentional disclosures. Information theft typically has two main goals: the first is to purposefully harm a business and commit cyberterrorism; the second is to obtain a competitive advantage. Although staff actions are typically the cause of unintentional releases, they can also have detrimental effects. Businesses should safeguard their intellectual property to avoid scenarios like this one. Acquiring comprehensive information regarding all potential pathways for leaks, available safeguards, and specifications relevant to these kinds of systems is crucial [1].

The security and integrity of data—including trade secrets, client and employee personal information, and strategic plans—are critical to the success of many businesses. Technology advancements have exposed businesses to new dangers and hazards that could cause financial and reputational harm. We'll examine why information leak protection is crucial for both small and large enterprises in this post. There are multiple strategies to stop internal data leaks. Setting up access privileges and limiting employee access to the databases and applications they need for work is the simplest method of data security. Establish access levels to paperwork in CRM, for instance, and provide the manager with the client connections he frequently communicates with. keeping an eye on employee behavior. You can record talks on your business phone and install a video surveillance system. Installing sophisticated monitoring systems on an employee's work computer is the most enlightening kind of control. Take Staffcop, Kickidler, and Insider, for instance. You will have complete control over everything that happens on your computer, including keystroke tracking, file manipulation, internet browsing, and security breach alerts.

A data breach may result in large expenses for businesses, such as lost revenue from cleanup operations, attorney bills, fines from authorities, and reputational harm. Clients and customers may lose trust in the company, which could result in a decline in sales and possibly even legal action. In severe circumstances, a data breach may result in the impacted company's bankruptcy or collapse. However, anyone whose private information was exposed in a data breach could become a victim of financial fraud, identity theft, or other cybercrimes, which could cause them to suffer emotionally and financially.

Workers need to be instructed and made aware of the need to preserve sensitive information. Human mistake is the main cause of data breaches, and phishing attempts are a common tool used by cybercriminals to collect personal information. Organizations can lower the risk of data breaches brought on by employee error by providing training to staff members about phishing, social engineering, and other cyber dangers.

To effectively respond to and mitigate data breaches, organizations need to have in place not only cybersecurity safeguards but also personnel training and a complete incident response strategy. The actions to be performed in the case of a data breach should be described in this document. These actions ought to involve getting in touch with everybody who might have been impacted, working with law enforcement and regulatory bodies, and starting a thorough investigation to identify the violation's origin and stop it from happening again in the future [2, p. 314-341].

Organizations are required to adhere to the General Data Protection Regulation (GDPR) in Europe and the Health Insurance Portability and Accountability Act (HIPAA) in the United States when it comes to policies. These regulations penalize non-compliance and lay out specific guidelines for safeguarding sensitive data [3, p. 402-442].

Furthermore, each person can take specific steps to stop data leaks. This entails creating strong and unique passwords for your personal online accounts, exercising caution when disclosing personal information online, keeping a close eye out for identity theft indicators in your bank statements and credit reports, and exercising caution when you receive unsolicited emails or messages that might try to coerce you into disclosing personal information. Strong cybersecurity safeguards, frequent employee training, incident response plans, and continuous training on data protection rules can all help increase resilience to the disastrous effects of a data breach. Even if there is always a chance of a data breach, protecting sensitive data beforehand can be quite advantageous.

CONCLUSION

Prioritizing cybersecurity measures is essential in order to protect sensitive data for both individuals and businesses, since data breaches continue to pose a serious threat. By closely following security procedures, staying up to date on new cyberthreats, and cultivating a watchful corporate culture, stakeholders can successfully lower the risk of data breaches and preserve the integrity of their digital assets. The battle against data leaks is not yet over. But in a constantly evolving digital landscape, we can fortify our defenses and safeguard our private information by acting swiftly and decisively.

 

References:

  1. Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211.
  2. Sen, Ravi, and Sharad Borle. "Estimating the contextual risk of data breach: An empirical approach." Journal of Management Information Systems 32, no. 2 (2015): 314-341.
  3. Zhang, X., Yadollahi, M. M., Dadkhah, S., Isah, H., Le, D. P., & Ghorbani, A. A. (2022). Data breach: analysis, countermeasures and challenges. International Journal of Information and Computer Security, 19(3-4), 402-442.
Информация об авторах

Senior Lecturer at the Department of Information Technologies,  Fergana Branch of the Tashkent University of Information Technologies named after Muhammad Al-Khorezmi, Uzbekistan, Fergana

старший преподаватель кафедры «Информационные технологии» Ферганского филиала Ташкентского университета информaционных технологий имени Мухаммада Аль-Хорезми, Узбекистан, г. Фергана

Assistant of the Fergana branch of the Tashkent University of Information Technologies, Republic of Uzbekistan, Fergana

ассистент Ферганского филиала Ташкентского университета информационных технологий, Республика Узбекистан, г. Фергана

Журнал зарегистрирован Федеральной службой по надзору в сфере связи, информационных технологий и массовых коммуникаций (Роскомнадзор), регистрационный номер ЭЛ №ФС77-54434 от 17.06.2013
Учредитель журнала - ООО «МЦНО»
Главный редактор - Ахметов Сайранбек Махсутович.
Top