Comprehensive approach to protecting data and the information system integrity

dc.citation.epage53
dc.citation.issue3
dc.citation.journalTitleВимірювальна техніка та метрологія
dc.citation.spage47
dc.citation.volume85
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorDzelendzyak, Ulyana
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-05-14T06:40:33Z
dc.date.created2024-02-27
dc.date.issued2024-02-27
dc.description.abstractThe article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications. Availability highlights the necessity of reliable and timely access to data, even in the face of potential system failures or disasters, by implementing safeguards like backups. Traceability, or audit trails, ensures accountability by logging user actions, which is crucials for investigating suspicious activities or data loss. The DIE model presents a modern approach to information security. Distributed systems minimize the impact of attacks by avoiding a single point of failure and incorporating redundancies. Immutable systems maintain unalterable logs to quickly identify and address anomalies, preventing malicious actors from covering up their actions. Ephemeral systems differentiate between essential, long-term “pets” and disposable “cattle”, advocating for a flexible infrastructure that can easily adapt to new challenges and retire vulnerable legacy systems. This model enhances security by reducing the attack surface and ensuring that only necessary, secure systems are maintained.
dc.format.extent47-53
dc.format.pages7
dc.identifier.citationDzelendzyak U. Comprehensive approach to protecting data and the information system integrity / Ulyana Dzelendzyak // Measuring Equipment and Metrology : scientific journal. — Lviv : Lviv Politechnic Publishing House, 2024. — Vol 85. — No 3. — P. 47–53.
dc.identifier.citationenDzelendzyak U. Comprehensive approach to protecting data and the information system integrity / Ulyana Dzelendzyak // Measuring Equipment and Metrology : scientific journal. — Lviv : Lviv Politechnic Publishing House, 2024. — Vol 85. — No 3. — P. 47–53.
dc.identifier.doidoi.org/10.23939/istcmtm2024.03.047
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/64547
dc.language.isoen
dc.publisherВидавництво Національного університету “Львівська політехніка”
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofВимірювальна техніка та метрологія, 3 (85), 2024
dc.relation.ispartofMeasuring Equipment and Metrology : scientific journal, 3 (85), 2024
dc.relation.references[1] Mark G. Graff, Kenneth R. van Wyk, Secure Coding: Principles and Practices, O’Reilly Media, Inc., 2023. https://www.amazon.com/Secure-Coding-Principles-MarkGraff/dp/0596002424
dc.relation.references[2] Welcome to the OWASP Top 10 – 2021 OWASP 2022. [Online]. Available https://owasp.org/Top10/
dc.relation.references[3] Paco Hope, Ben Walther, Web Security Testing Cookbook, O’Reilly Media, Inc., 2008. https://www.oreilly.com/library/view/web-securitytesting/9780596514839/
dc.relation.references[4] Secure coding guidelines, Microsoft 2021. [Online]. Available: https://learn.microsoft.com/en-us/dotnet/standard/security/secure-coding-guidelines
dc.relation.references[5] Mark J. Price. C# 9 and .NET 5 – Modern Cross-Platform Development: Build intelligent apps, websites, and services with Blazor, ASP.NET Core, and Entity Framework Core using Visual Studio Code, 5th ed; Packt Publishing: 35 Livery Street Birmingham B3, 2PB, UK, 2020. https://www.amazon.com/NET-Cross-PlatformDevelopment-intelligent-Framework/dp/180056810X
dc.relation.references[6] Samuele Resca. Hands-On RESTful Web Services with ASP.NET Core 3 1st ed; Packt Publishing: 35 Livery Street Birmingham B3, 2PB, UK, 2019. https://www.amazon.com/Hands-RESTful-Services-ASPNET-Core/dp/1789537614
dc.relation.references[7] Secure development and deployment guidance, National Cyber Security Centre. [Online]. Available: https://www.ncsc.gov.uk/collection/developers-collection
dc.relation.references[8] Adam Freeman. Pro ASP.NET Core 6: Develop CloudReady Web Applications Using MVC, Blazor, and Razor Pages, 9th ed; Appres: London, UK, 2022. https://www.amazon.com/Pro-ASP-NET-Core-CloudReady-Applications/dp/1484279565
dc.relation.references[9] Cesar de la Torre, Bill Wagner, Mike Rousos, NET Microservices Architecture for Containerized .NET Applications, One Microsoft Way Redmond, Washington 98052-6399, 2022. https://learn.microsoft.com/enus/dotnet/architecture/microservices/
dc.relation.references[10] V. Samotyy, U. Dzelendzyak, N. Mashtaler, “A Comparative Study of Data Annotations and Fluent Validation in. NET”, International Journal of Computing, Vol. 23, Iss. 1, pp. 72–77, 2024. DOI: 10.47839/ijc.23.1.3437.
dc.relation.references[11] Suliman Alazmi; Daniel Conte De Leon, “A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners”, IEEE Access, Vol. 10, pp. 33200–33219, 2022. DOI: 10.1109/ACCESS.2022.3161522
dc.relation.references[12] Andreas Dann, Henrik Plate, Ben Hermann, Serena Elisa Ponta, Eric Bodden, “Identifying Challenges for OSS Vulnerability Scanners – A Study & Test Suite”, IEEE Transactions on Software Engineering, Vol. 48, pp. 3613–3625, 2022. DOI: 10.1109/TSE.2021.3101739.
dc.relation.references[13] Ishan Siddiqui, Ankit Pandey, Saurabh Jain, Hetang Kothadia, Renuka Agrawal, Neha Chankhore, “Comprehensive Monitoring and Observability with Jenkins and Grafana: A Review of Integration Strategies, Best Practices, and Emerging Trends”, Comprehensive Monitoring and Observability with Jenkins and Grafana: A Review of Integration Strategies, Best Practices, and Emerging Trends, Ankara, Turkiye, 26–28 October 2023. DOI: 10.1109/ISMSIT58785.2023.10304904.
dc.relation.references[14] Muhammad Usman, Simone Ferlin, Anna Brunstrom, Javid Taheri, “A Survey on Observability of Distributed Edge & Container-Based Microservices”, IEEE Access, Vol. 10, pp. 86904–86919, 2022. DOI: 10.1109/ACCESS.2022.3193102.
dc.relation.referencesen[1] Mark G. Graff, Kenneth R. van Wyk, Secure Coding: Principles and Practices, O’Reilly Media, Inc., 2023. https://www.amazon.com/Secure-Coding-Principles-MarkGraff/dp/0596002424
dc.relation.referencesen[2] Welcome to the OWASP Top 10 – 2021 OWASP 2022. [Online]. Available https://owasp.org/Top10/
dc.relation.referencesen[3] Paco Hope, Ben Walther, Web Security Testing Cookbook, O’Reilly Media, Inc., 2008. https://www.oreilly.com/library/view/web-securitytesting/9780596514839/
dc.relation.referencesen[4] Secure coding guidelines, Microsoft 2021. [Online]. Available: https://learn.microsoft.com/en-us/dotnet/standard/security/secure-coding-guidelines
dc.relation.referencesen[5] Mark J. Price. C# 9 and .NET 5 – Modern Cross-Platform Development: Build intelligent apps, websites, and services with Blazor, ASP.NET Core, and Entity Framework Core using Visual Studio Code, 5th ed; Packt Publishing: 35 Livery Street Birmingham B3, 2PB, UK, 2020. https://www.amazon.com/NET-Cross-PlatformDevelopment-intelligent-Framework/dp/180056810X
dc.relation.referencesen[6] Samuele Resca. Hands-On RESTful Web Services with ASP.NET Core 3 1st ed; Packt Publishing: 35 Livery Street Birmingham B3, 2PB, UK, 2019. https://www.amazon.com/Hands-RESTful-Services-ASPNET-Core/dp/1789537614
dc.relation.referencesen[7] Secure development and deployment guidance, National Cyber Security Centre. [Online]. Available: https://www.ncsc.gov.uk/collection/developers-collection
dc.relation.referencesen[8] Adam Freeman. Pro ASP.NET Core 6: Develop CloudReady Web Applications Using MVC, Blazor, and Razor Pages, 9th ed; Appres: London, UK, 2022. https://www.amazon.com/Pro-ASP-NET-Core-CloudReady-Applications/dp/1484279565
dc.relation.referencesen[9] Cesar de la Torre, Bill Wagner, Mike Rousos, NET Microservices Architecture for Containerized .NET Applications, One Microsoft Way Redmond, Washington 98052-6399, 2022. https://learn.microsoft.com/enus/dotnet/architecture/microservices/
dc.relation.referencesen[10] V. Samotyy, U. Dzelendzyak, N. Mashtaler, "A Comparative Study of Data Annotations and Fluent Validation in. NET", International Journal of Computing, Vol. 23, Iss. 1, pp. 72–77, 2024. DOI: 10.47839/ijc.23.1.3437.
dc.relation.referencesen[11] Suliman Alazmi; Daniel Conte De Leon, "A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners", IEEE Access, Vol. 10, pp. 33200–33219, 2022. DOI: 10.1109/ACCESS.2022.3161522
dc.relation.referencesen[12] Andreas Dann, Henrik Plate, Ben Hermann, Serena Elisa Ponta, Eric Bodden, "Identifying Challenges for OSS Vulnerability Scanners – A Study & Test Suite", IEEE Transactions on Software Engineering, Vol. 48, pp. 3613–3625, 2022. DOI: 10.1109/TSE.2021.3101739.
dc.relation.referencesen[13] Ishan Siddiqui, Ankit Pandey, Saurabh Jain, Hetang Kothadia, Renuka Agrawal, Neha Chankhore, "Comprehensive Monitoring and Observability with Jenkins and Grafana: A Review of Integration Strategies, Best Practices, and Emerging Trends", Comprehensive Monitoring and Observability with Jenkins and Grafana: A Review of Integration Strategies, Best Practices, and Emerging Trends, Ankara, Turkiye, 26–28 October 2023. DOI: 10.1109/ISMSIT58785.2023.10304904.
dc.relation.referencesen[14] Muhammad Usman, Simone Ferlin, Anna Brunstrom, Javid Taheri, "A Survey on Observability of Distributed Edge & Container-Based Microservices", IEEE Access, Vol. 10, pp. 86904–86919, 2022. DOI: 10.1109/ACCESS.2022.3193102.
dc.relation.urihttps://www.amazon.com/Secure-Coding-Principles-MarkGraff/dp/0596002424
dc.relation.urihttps://owasp.org/Top10/
dc.relation.urihttps://www.oreilly.com/library/view/web-securitytesting/9780596514839/
dc.relation.urihttps://learn.microsoft.com/en-us/dotnet/standard/security/secure-coding-guidelines
dc.relation.urihttps://www.amazon.com/NET-Cross-PlatformDevelopment-intelligent-Framework/dp/180056810X
dc.relation.urihttps://www.amazon.com/Hands-RESTful-Services-ASPNET-Core/dp/1789537614
dc.relation.urihttps://www.ncsc.gov.uk/collection/developers-collection
dc.relation.urihttps://www.amazon.com/Pro-ASP-NET-Core-CloudReady-Applications/dp/1484279565
dc.relation.urihttps://learn.microsoft.com/enus/dotnet/architecture/microservices/
dc.rights.holder© Національний університет “Львівська політехніка”, 2027
dc.subjectInformation security
dc.subjectConfidentiality
dc.subjectData integrity
dc.subjectSystem availability
dc.subjectTraceability
dc.subjectAccess control
dc.subjectData protection
dc.subjectDistributed systems
dc.subjectImmutability
dc.subjectand Ephemeral infrastructure
dc.titleComprehensive approach to protecting data and the information system integrity
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2024v85n3_Dzelendzyak_U-Comprehensive_approach_47-53.pdf
Size:
172.69 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
2024v85n3_Dzelendzyak_U-Comprehensive_approach_47-53__COVER.png
Size:
509.81 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.75 KB
Format:
Plain Text
Description: