A DATA DEFENSE STRATEGY FOR MODERN BUSINESS ENVIRONMENT

Main Article Content

FLORIN OGIGAU NEAMTIU
Sorin-Aurel MORARU
DOMINIC MIRCEA KRISTALY

Abstract

In the last decade, technology has experienced a tremendous development and organizations have adopted it quickly and extensively to the core of their processes. The great capabilities offered to connect, communicate with, and remotely manage, via the Internet, a large number of interconnected, automated devices are becoming present everywhere, in large organization or residential compounds. Many of the modern organizations rely heavily on un-matured technologies to obtain competitive advantages and in many cases implement it without conducting extensive risk management studies or implementing sustainable operating policies. The great advantages information provides to the modern environment combined with the organization’s high dependence of its core processes upon technology as a data processing instrument attracted malicious actors in trying to exploit the systems. In the last years cybercrime actions experienced great success, many of them conducted over many public and private organizations, which invested lots of resources in security solutions. Such tremendous success raises multiple questions on the validity of the defensive instruments used and even on the overall defense-in-depth strategy employed nowadays as an industry de facto standard.

Downloads

Download data is not yet available.

Article Details

Section
Articles