A DATA DEFENSE STRATEGY FOR MODERN BUSINESS ENVIRONMENT
Main Article Content
Abstract
In the last decade, technology has experienced a tremendous development and organizations have adopted it quickly and extensively to the core of their processes. The great capabilities offered to connect, communicate with, and remotely manage, via the Internet, a large number of interconnected, automated devices are becoming present everywhere, in large organization or residential compounds. Many of the modern organizations rely heavily on un-matured technologies to obtain competitive advantages and in many cases implement it without conducting extensive risk management studies or implementing sustainable operating policies. The great advantages information provides to the modern environment combined with the organization’s high dependence of its core processes upon technology as a data processing instrument attracted malicious actors in trying to exploit the systems. In the last years cybercrime actions experienced great success, many of them conducted over many public and private organizations, which invested lots of resources in security solutions. Such tremendous success raises multiple questions on the validity of the defensive instruments used and even on the overall defense-in-depth strategy employed nowadays as an industry de facto standard.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.