RESEARCH ON OPTIMIZING THE CYBERSECURITY OF SENSITIVE DATA
Keywords:
Cybersecurity, sensitive data, SMEs, Open-source tools, Virtual infrastructure, security incidents, resilienceAbstract
In the context of increasing digital interconnectivity, ensuring the protection of sensitive data has become a critical priority for organizations of all sizes. Cybersecurity threats such as ransomware, phishing, and distributed denial-of-service (DDoS) attacks continue to escalate in frequency and sophistication, disproportionately affecting small and medium-sized enterprises (SMEs) with limited resources. This research addresses the need for accessible and efficient security solutions by exploring approaches that emphasize modularity, real-time detection and adaptability. The study highlights the potential of open-source and scalable frameworks to enhance cybersecurity resilience, offering a viable alternative to traditional commercial tools and emphasizing the importance of proactive defense strategies in today's threat landscape.
Downloads
References
Stallings, W. (2020). Network Security Essentials: Applications and Standards, in English (Network Security Essentials), Pearson, ISBN 9780134527338, Boston
Andress, J. (2021). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, in English (The Basics of Information Security), Syngress, ISBN 9780128007440, Amsterdam.
Enoka, S. (2019). Cybersecurity for Small Networks, in English (Cybersecurity for Small Networks), Packt Publishing, ISBN 9781789809015, Birmingham.
https://www.fbi.gov/news/press-releases/fbi-releases- annual-internet-crime-report Accessed: 2025-03-20
https://www.ic3.gov/AnnualReport/Reports/2024_IC3R eport.pdf Accessed: 2025-03-20
https://industrialcyber.co/reports/fbis-internet-crime- report-2024-records-16-6-billion-in-cybercrime-losses- amid-rising-ransomware-threats/ Accessed: 2025-03-20
Meeuwisse, R. (2017). Cybersecurity for Beginners, in English (Cybersecurity for Beginners), Cyber Simplicity Ltd., ISBN 9781911452034, London
Grimes, R.A. (2017). Hacking the Hacker: Learn from the Experts Who Take Down Hackers, in English (Hacking the Hacker), Wiley, ISBN 9781119396215, Indianapolis
Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security, in English (Fundamentals of Information Systems Security), Jones & Bartlett Learning, ISBN 9781284116458, Burlington
Skoudis, E., Liston, T. (2006). Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, in English (Counter Hack Reloaded), Prentice Hall, ISBN 9780131481046, Upper Saddle River
Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, in English (Countdown to Zero Day), Crown Publishing, ISBN 9780770436179, New York
Verizon. (2025). 2025 Data Breach Investigations Report, available at: https://www.verizon.com/business/resources/Tb77/report s/2025-dbir-data-breach-investigations-report.pdf Accessed: 2025-05-24.
Handa, A., Negi, R., Venkatesan, S., Shukla, S.K. (2023). Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II, River Publishers, ISBN 9788770227950, Gistrup, Denmark.
Stellar Cyber. (2023). Open XDR vs. SIEM: Choosing Cybersecurity Solutions, available at: https://stellarcyber.ai/open-xdr-vs-siem/ Accessed: 2025- 05-24.
Seceon. (2022). Comparing SIEM Solutions: Advanced Security Analytics Platforms, available at: https://seceon.com/comparing-siem-solutions-advanced- security-analytics-platforms/ Accessed: 2025-05-24.
Ishikawa, T. (2024). Public and Private Governance of Cybersecurity: Challenges and Potential Solutions, Cambridge University Press, ISBN 9781009374530, Cambridge
Negg Blog. (2023). Cyber security open source: advantages and limitations, available at: https://negg.blog/en/cyber-security-open-source- advantages-and-limitations/ Accessed: 2025-05-24.
SentinelOne . (2023). 13 Open Source Software Security Risks, available https://www.sentinelone.com/cybersecurity- 101/cybersecurity/open-source-software-security-risks/ Accessed: 2025-05-24.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.