Critical cybersecurity aspects for improving enterprise digital infrastructure protection
Article Sidebar
Open full text
Issue Vol. 15 No. 1 (2025)
-
Statistical reliability of decisions on controlled process faults
Yevhen Volodarskyi, Oleh Kozyr, Zygmunt Warsza5-9
-
Pulse chaotic generator based a classical Chua’s circuit
Volodymyr Rusyn, Andrii Samila, Bogdan Markovych, Aceng Sambas, Christos Skiadas, Milan Guzan10-14
-
Stability of metaheuristic PID controllers in photovoltaic dc microgrids
Elvin Yusubov, Lala Bekirova15-21
-
Integrating numerical simulation and experimental data for enhanced structural health monitoring of bridges
Om Narayan Singh, Kaushik Dey22-26
-
Application of multi-agent programming for modeling the viscosity state of mash in alcohol production
Larysa Gumeniuk, Ludmyla Markina, Viktor Satsyk, Pavlo Humeniuk, Anton Lashch27-32
-
A stochastic interval algebra for smart factory processes
Piotr Dziurzanski, Konrad Kabala, Agnieszka Konrad33-38
-
Advancements in solar panel maintenance: a review of IoT-integrated automatic dust cleaning systems
Balamurugan Rangaswamy, Ramasamy Nithya39-44
-
Modified cosine-quadratic reflectance model
Oleksandr Romanyuk, Volodymyr Lytvynenko, Yevhen Zavalniuk45-48
-
Comparative analysis of lithium-iron-phosphate and sodium-ion energy storage devices
Huthaifa A. Al_Issa, Mohamed Qawaqzeh, Lina Hani Hussienat, Ruslan Oksenych, Oleksandr Miroshnyk, Oleksandr Moroz, Iryna Trunova, Volodymyr Paziy, Serhii Halko, Taras Shchur49-54
-
Investigation of DC-AC converter with microcontroller control of inverter frequency
Anatolii Tkachuk, Mykola Polishchuk, Liliia Polishchuk, Serhii Kostiuchko, Serhii Hryniuk, Liudmyla Konkevych55-61
-
Mathematical apparatus for finding the optimal configuration secure communication network with a specified number of subscribers
Volodymyr Khoroshko, Yuliia Khokhlachova, Oleksandr Laptiev, Al-Dalvash Ablullah Fowad62-66
-
Critical cybersecurity aspects for improving enterprise digital infrastructure protection
Roman Kvуetnyy, Volodymyr Kotsiubynskyi, Serhii Husak, Yaroslav Movchan, Nataliia Dobrovolska, Sholpan Zhumagulova, Assel Aitkazina67-72
-
Modification of the Peterson algebraic decoder
Dmytro Mogylevych, Iryna Kononova, Liudmyla Pogrebniak, Kostiantyn Lytvyn, Igor Gyrenko73-78
-
Development of a model for calculating the dilution of precision coefficients of the global navigation system at a given point in space
Oleksandr Turovsky, Nazarii Blazhennyi, Roman Vozniak, Yana Horbachova, Kostiantyn Horbachov, Nataliia Rudenko79-87
-
LLM based expert AI agent for mission operation management
Sobhana Mummaneni, Syama Sameera Gudipati, Satwik Panda88-94
-
Review of operating systems used in unmanned aerial vehicles
Viktor Ivashko, Oleh Krulikovskyi, Serhii Haliuk, Andrii Samila95-100
-
Optimization of machine learning methods for de-anonymization in social networks
Nurzhigit Smailov, Fatima Uralova, Rashida Kadyrova, Raiymbek Magazov, Akezhan Sabibolda101-104
-
Robust deepfake detection using Long Short-Term Memory networks for video authentication
Ravi Kishan Surapaneni, Hameed Syed, Harshitha Kakarala, Venkata Sai Srikar Yaragudipati105-108
-
Regional trending topics mining from real time Twitter data for sentiment, context, network and temporal analysis
Mousumi Hasan, Mujiba Shaima, Quazi Saad ul Mosaher109-116
-
Model development to improve the predictive maintenance reliability of medical devices
Khalid Musallam Alahmadi, Essam Rabea Ibrahim Mahmoud, Fitrian Imaduddin117-124
-
Explainable artificial intelligence for detecting lung cancer
Vinod Kumar R S, Bushara A R, Abubeker K M, Smitha K M, Abini M A, Jubaira Mammoo, Bijesh Paul125-130
-
Design and implementation of a vein detection system for improved accuracy in blood sampling
Omar Boutalaka, Achraf Benba, Sara Sandabad131-134
-
Metrological feature for determining the concentration of cholesterol, triglycerides, and phospholipids for psoriasis detection
Ivan Diskovskyi, Yurii Kachurak, Orysya Syzon, Marta Kolishetska, Bogdan Pinaiev, Oksana Stoliarenko135-138
-
Development of a mobile application for testing fine motor skills disorders
Marko Andrushchenko, Karina Selivanova, Oleg Avrunin, Alla Kraievska, Orken Mamyrbayev, Kymbat Momynzhanova139-143
-
Artificial intelligence in education: ChatGPT-based simulations in teachers’ preparation
Marina Drushlyak, Tetiana Lukashova, Volodymyr Shamonia, Olena Semenikhina144-152
-
CKSD: Comprehensive Kurdish-Sorani database
Jihad Anwar Qadir, Samer Kais Jameel, Wshyar Omar Khudhur, Kamaran H. Manguri153-156
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
Main Article Content
DOI
Authors
Abstract
This article is related to the security landscape that evolves to protect the digital infrastructure of organizations. As the number of interconnected systems, cloud computing, and IoT devices increases, so do today's security risks. Hence, effective protection measures are needed. This study is meant to identify common server security risks, analyze protection methods, enhance alerting and monitoring, implement fraud prevention, handle code vulnerabilities, and provide recommendations. To prove the effectiveness of some of these proposed security measures, in-depth practical testing and simulation are done, proving that proactive security strategy is key in today's digital environment. The article addresses the broad segment of best practices, modern technologies, and strategies to protect enterprise digital infrastructure in light of the most recent cybersecurity challenges.
Keywords:
References
[1] Amoo O. O. et al.: GDPR's impact on cybersecurity: A review focusing on USA and European practices. International Journal of Science and Research Archive 11(01), 2024, 1338–1347. DOI: https://doi.org/10.30574/ijsra.2024.11.1.0220
[2] Bisikalo O. et al.: Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Entropy 25(2), 2023, 184. DOI: https://doi.org/10.3390/e25020184
[3] Bravo C., Toska D.: The Art of Social Engineering: Uncover the Secrets Behind the Human Dynamics in Cybersecurity. Packt Publishing, Birmingham 2023.
[4] Kelley D., Moyle E.: Practical Cybersecurity Architecture - Second Edition: A Guide to Creating and Implementing Robust Designs for Cybersecurity Architects. Packt Publishing, Birmingham 2023.
[5] Mack S. D.: The DevSecOps Playbook: Deliver Continuous Security at Speed. Wiley 2023. DOI: https://doi.org/10.1002/9781394189281
[6] National Institute of Standards and Technology (NIST). Zero Trust Architecture: An Introduction, 2023 [https://www.nist.gov/cybersecurity/zero-trust].
[7] NIST National Cybersecurity Center of Excellence. Implementing a Zero Trust Architecture. NIST Cybersecurity Practice Guide [https://www.nccoe.nist.gov/sites/default/files/2024-07/zta-nist-sp-1800-35-preliminary-draft-4.pdf].
[8] Open Web Application Security Project (OWASP). (n.d.). Top Ten Web Application Security Risks [https://owasp.org/www-project-top-ten/].
[9] Security Magazine. Best Practices for Server Security, 2023 [https://www.securitymagazine.com/articles/93274-best-practices-for-server-security].
Article Details
Abstract views: 229

