SECURE DATA STORAGE: METHODS AND APPROACHES
Author(s): Vasilev T.I.
Rubric: Information technology
DOI: 10.21777/2500-2112-2025-1-68-76
Release: 2025-1 (50)
Pages: 68-76
Keywords: secure data storage, information security, social engineering, configuration vulnerabilities, insider attacks, cryptographic protection, multilayer security, prototyping of security systems, methods for preventing data leaks
Annotation: The article describes the key aspects of the secure storage of organizational data in the modern world. The most common threats such as social engineering, configuration vulnerabilities, and insider attacks are discussed. The analysis of existing approaches to secure data storage in terms of software and hardware and their functional interaction in the information security system is carried out. Based on the results of the analysis, a prototype application was built using existing approaches and minimal risk of data leakage. Practical recommendations on choosing key ways to securely store data are presented. A methodology for projecting a secure environment based on a comprehensive review of technical, organizational and regulatory aspects is proposed. The novelty of the result obtained lies in the forming of a new multi-layered approach to data protection, including a single standard for the interaction of services. The practical significance of the results obtained lies in the possibility of direct application of the proposed methods within industrial systems, which will increase the level of security and reliability of confidential information processing.
Bibliography: Vasilev T.I. SECURE DATA STORAGE: METHODS AND APPROACHES // Education Resources and Technologies. – 2025. – № 1 (50). – С. 68-76. doi: 10.21777/2500-2112-2025-1-68-76