Skladannyi, Pavlo and Mashkina, Iryna and Rzaeva, Svitlana and Kostiuk, Yuliia (2025) Methods of GDPR for Ensuring Data Storage Security Against Leaks and Threats Телекомунікаційні та інформаційні технології, 87 (2). pp. 59-76. ISSN 2412-4338
![]() |
Text
Skladannyi_P_Mashkina_I_Rzaeva_S_Y_Kostiuk_TiT_2_87_2025.pdf Download (508kB) |
Abstract
This article explores the issue of protecting data storage systems from leaks and threats in the context of implementing the security requirements of the General Data Protection Regulation (GDPR). This topic is critically relevant given the increasing volumes of processed information. The authors emphasize the lack of specialized studies that examine the compliance of data storage security with GDPR standards. It has been determined that nearly all digital platforms, organizations, and institutions rely on data storage solutions, making them highly vulnerable to various threats—both external (hacker attacks, phishing, malware) and internal (human factor, intentional or unintentional leaks by employees of institutions or organizations).This study systematizes five main categories of threats to data storage security: unauthorized access, internal data leaks, phishing attacks, malware, and issues related to improper data storage and backup management. For each category, real-world examplesof security breaches from the past five years are provided, illustrating the impact of these threats on the protection of personal data. The article also examines the application of security measures such as data encryption (AES-256, TLS), access control,monitoring, pseudonymization, anonymization, backup strategies, and the automation of data processing, in accordance with various articles of the GDPR.This research holds not only analytical but also practical value, as it provides a comprehensive perspective on how to implement both technical and organizational security measures for data storage in compliance with GDPR requirements. The study describes models for enforcing security policies, logging mechanisms, and data integrity verification. Additionally, it underscores the importance of fostering a culture of information security and raising awareness among employees.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | GDPR; data security; information leakage; data storage; encryption; threats; cybersecurity; attacks |
Subjects: | Статті у періодичних виданнях > Фахові (входять до переліку фахових, затверджений МОН) |
Divisions: | Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка |
Depositing User: | Павло Миколайович Складанний |
Date Deposited: | 25 Jun 2025 13:26 |
Last Modified: | 25 Jun 2025 13:26 |
URI: | https://elibrary.kubg.edu.ua/id/eprint/52208 |
Actions (login required)
![]() |
View Item |