RESEARCH ON OPTIMIZING THE CYBERSECURITY OF SENSITIVE DATA

Authors

  • Mariana-Luminita Achim National University of Science and Technology POLITEHNICA Bucharest

Keywords:

Cybersecurity, sensitive data, SMEs, Open-source tools, Virtual infrastructure, security incidents, resilience

Abstract

In the context of increasing digital interconnectivity, ensuring the protection of sensitive data has become a critical priority for organizations of all sizes. Cybersecurity threats such as ransomware, phishing, and distributed denial-of-service (DDoS) attacks continue to escalate in frequency and sophistication, disproportionately affecting small and medium-sized enterprises (SMEs) with limited resources. This research addresses the need for accessible and efficient security solutions by exploring approaches that emphasize modularity, real-time detection and adaptability. The study highlights the potential of open-source and scalable frameworks to enhance cybersecurity resilience, offering a viable alternative to traditional commercial tools and emphasizing the importance of proactive defense strategies in today's threat landscape.

Downloads

Download data is not yet available.

References

Stallings, W. (2020). Network Security Essentials: Applications and Standards, in English (Network Security Essentials), Pearson, ISBN 9780134527338, Boston

Andress, J. (2021). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, in English (The Basics of Information Security), Syngress, ISBN 9780128007440, Amsterdam.

Enoka, S. (2019). Cybersecurity for Small Networks, in English (Cybersecurity for Small Networks), Packt Publishing, ISBN 9781789809015, Birmingham.

https://www.fbi.gov/news/press-releases/fbi-releases- annual-internet-crime-report Accessed: 2025-03-20

https://www.ic3.gov/AnnualReport/Reports/2024_IC3R eport.pdf Accessed: 2025-03-20

https://industrialcyber.co/reports/fbis-internet-crime- report-2024-records-16-6-billion-in-cybercrime-losses- amid-rising-ransomware-threats/ Accessed: 2025-03-20

Meeuwisse, R. (2017). Cybersecurity for Beginners, in English (Cybersecurity for Beginners), Cyber Simplicity Ltd., ISBN 9781911452034, London

Grimes, R.A. (2017). Hacking the Hacker: Learn from the Experts Who Take Down Hackers, in English (Hacking the Hacker), Wiley, ISBN 9781119396215, Indianapolis

Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security, in English (Fundamentals of Information Systems Security), Jones & Bartlett Learning, ISBN 9781284116458, Burlington

Skoudis, E., Liston, T. (2006). Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, in English (Counter Hack Reloaded), Prentice Hall, ISBN 9780131481046, Upper Saddle River

Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, in English (Countdown to Zero Day), Crown Publishing, ISBN 9780770436179, New York

Verizon. (2025). 2025 Data Breach Investigations Report, available at: https://www.verizon.com/business/resources/Tb77/report s/2025-dbir-data-breach-investigations-report.pdf Accessed: 2025-05-24.

Handa, A., Negi, R., Venkatesan, S., Shukla, S.K. (2023). Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II, River Publishers, ISBN 9788770227950, Gistrup, Denmark.

Stellar Cyber. (2023). Open XDR vs. SIEM: Choosing Cybersecurity Solutions, available at: https://stellarcyber.ai/open-xdr-vs-siem/ Accessed: 2025- 05-24.

Seceon. (2022). Comparing SIEM Solutions: Advanced Security Analytics Platforms, available at: https://seceon.com/comparing-siem-solutions-advanced- security-analytics-platforms/ Accessed: 2025-05-24.

Ishikawa, T. (2024). Public and Private Governance of Cybersecurity: Challenges and Potential Solutions, Cambridge University Press, ISBN 9781009374530, Cambridge

Negg Blog. (2023). Cyber security open source: advantages and limitations, available at: https://negg.blog/en/cyber-security-open-source- advantages-and-limitations/ Accessed: 2025-05-24.

SentinelOne . (2023). 13 Open Source Software Security Risks, available https://www.sentinelone.com/cybersecurity- 101/cybersecurity/open-source-software-security-risks/ Accessed: 2025-05-24.

Downloads

Published

2025-06-24

Issue

Section

Research Papers