Analysis of modern approaches to ensuring cyber security of corporate databases
DOI: 10.31673/2409-7292.2024.020006
DOI:
https://doi.org/10.31673/2409-7292.2024.020006Abstract
The article is devoted to the analysis of modern approaches to ensuring cyber security of corporate databases. The relevance of the study is due to the increase in the amount of data of organizations and enterprises and the growing number of leaks of confidential information from corporate databases that have been recorded in recent years. The relevance is confirmed by the result of the forecast carried out in the work using regression analysis based on statistical data. The analysis of publications revealed a sufficient number of studies of modern approaches to the protection of corporate databases. It has been established that research is aimed at applying artificial intelligence, quantum computing and cloud technologies to traditional approaches to database security. A feature of the modern approach is the use of standard libraries of the Python programming language when applying artificial intelligence in the protection of corporate databases, which allows automating the processes of their cyber protection. At the same time, during the analysis, it was found that research by scientists is mainly carried out in the direction of improving the protection of ready-made databases, without taking into account the requirements of information security standards at the database design stage. This approach creates the problem of adjusting the structure of the database in the future, which will lead to additional unplanned costs of human and material resources. To solve this problem, a preventive approach is proposed in the work, which is based on a combination of the stages of creating a base and its protection system during design. For this, conceptual Entity-relationship models have been developed, the essence of which is to establish the essence of the base protection organization with their attributes and connections for building a security system at the design stage.
Keywords: cyber security, corporate databases, information protection.