INFORMATION SECURITY TECHNOLOGIES
DOI:
https://doi.org/10.47390/ts3030-3702v3i2y2025N05Keywords:
information security, cybersecurity, cryptography, authentication, network security, data protection, risk analysis, information system, protection strategies, information encryption.Abstract
This article discusses modern technologies used in ensuring information security, their functions and effectiveness. Along with the expansion of the global information space and the increase in cybersecurity threats, the issue of information protection is gaining urgent importance. The article analyzes such areas as cryptographic methods, authentication, network security, risk analysis and protection strategies in ensuring information security. It also considers advanced approaches to identifying and eliminating vulnerabilities in information systems. The article may be useful for professionals and researchers working in the field.
References
1. ISO/IEC 27001:2013 – Information security management systems – Requirements. International Organization for Standardization, 2013.
2. ISO/IEC 27002:2013 – Code of practice for information security controls. International Organization for Standardization, 2013.
3. Stallings, W. (2017). Network Security Essentials: Applications and Standards. 6th Edition. Pearson Education.
4. Whitman, M.E., & Mattord, H.J. (2018). Principles of Information Security. 6th Edition. Cengage Learning.
5. Andress, J. (2019). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. 2nd Edition. Syngress.
6. Kaspersky, E. (2020). Network Security and Cryptography. 3rd Edition. McGraw-Hill.
7. Kaspersky, E. (2020). Network Security and Cryptography. 3rd Edition. McGraw-Hill.
8. Schneier, B. (2015). Secrets and Lies: Digital Security in a Networked World. Wiley.
9. ISO/IEC 27005:2018 – Information security risk management. International Organization for Standardization, 2018.
10. Bertino, E., Sandhu, R. (2005). Database Security: Concepts, Approaches, and Challenges. Springer.
11. Sommers, M. (2020). Cybersecurity and Information Security Fundamentals. CRC Press.
12. Rainer, M. (2020). Network Security: A Beginner's Guide. McGraw-Hill.
13. Merritt, M. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers. McGraw-Hill.
14. Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley