PROTECTION OF UNSTRUCTURED INFORMATION ON A MOBILE DEVICE

Evgen Brovchenko, Valery Samarai, Ivan Datsenko, Volodymyr Pavlenko, Andrew Sereda
{"title":"PROTECTION OF UNSTRUCTURED INFORMATION ON A MOBILE DEVICE","authors":"Evgen Brovchenko, Valery Samarai, Ivan Datsenko, Volodymyr Pavlenko, Andrew Sereda","doi":"10.36994/2788-5518-2023-01-05-21","DOIUrl":null,"url":null,"abstract":"Information technology (IT) and computer systems are becoming an integral part of modern man's life, irreplaceable assistants. The development of IT happens at lightning speed and has a great impact on our society, every day we could observe new technical and engineering inventions. Moreover, it can be both a certain integration into the work process - automation of the daily routine, and part of leisure - communication and entertainment, etc. The entire complex of technologies and systems improve and facilitate the performance of everyday tasks, open new opportunities and remove borders. It is difficult to imagine a modern person without a mobile phone or tablet, which has almost continuous and unlimited access to the Internet or the worldwide global network. Today, a mobile device has a certain sacred meaning, it can contain a lot of different information or data. The nature and importance of this information may vary, but protection is a priority. And considering the developed dynamics and the uncertainty of some processes, engineers and developers face a difficult and important task to protect information systems and ensure reliable operation. To some extent, the mobile device can be considered the most problematic component. This device has a few advantages and features - this is exactly what makes it vulnerable to potential attackers and user actions can cause a few problems. This article is devoted to the problems of using mobile devices and protecting unstructured information. Protecting unstructured information on a mobile device is an important task from a cybersecurity perspective. Unstructured information can be in the form of text documents, emails, photos, videos, voice recordings, and other content stored on mobile devices. The main problems include loss or theft of a mobile device; operating system and software vulnerabilities; insufficient level of encryption and insufficient level of complexity of passwords; neglect of cyber hygiene. Existing engineering and architectural solutions do not always fulfill the task and may have problems with integration. Do not forget about the economic component. The analysis of the application area and the research results indicate that information protection in general is important and there is a demand for quick and effective solutions regarding the security of information systems in general and mobile devices. Only an integrated approach can provide an effective solution. The future of protecting unstructured information on mobile devices will be based on a combination of technological innovations and increased user awareness of cybersecurity issues. Some areas of development include the use of artificial intelligence (AI) and machine learning: AI can help develop advanced defense mechanisms that automatically detect anomalous or suspicious activity and block potential threats; biometric authentication, improvements in biometric authentication technologies, such as facial recognition, fingerprints, can provide more reliable protection of unstructured information; application of blockchain technologies: blockchain can play an important role in ensuring information security, as it allows data to be stored distributed and protected from changes; development of quantum-resistant encryption algorithms: with the development of quantum computers, there is a need for new encryption algorithms that can withstand the power of quantum hacking; privacy by design (Privacy by Design): designing mobile devices and applications with user privacy in mind will help protect unstructured information on mobile devices; user education and awareness: increasing users' awareness of cyber security and teaching them effective methods of protecting information on mobile devices will help reduce the risk of security incidents; development of the legislation and regulatory framework, improvement of the legislation and regulatory framework in the field of cyber security will contribute to the creation of a reliable environment for the protection of unstructured information. Securing unstructured information on mobile devices will rely on a combination of technological advances, user education, and collaboration between various parties such as developers, service providers, and lawmakers. Ensuring data security and privacy in the digital world remains a priority as the number of mobile devices and their use continues to grow. The modern user of mobile devices has certain requirements related to ergonomics and the level of information awareness. The development of the industry requires fast, reliable, and effective solutions that fall not only in the economic plane, but also in the plane of cyber security. The use of mobile devices can adapt to the fast-paced modern security needs of an organization and can be easily configured to meet specific requirements. A mobile device is convenient and affordable for many users, it is usually close to the user and can be used as an additional security element.","PeriodicalId":165726,"journal":{"name":"Інфокомунікаційні та комп’ютерні технології","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Інфокомунікаційні та комп’ютерні технології","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36994/2788-5518-2023-01-05-21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Information technology (IT) and computer systems are becoming an integral part of modern man's life, irreplaceable assistants. The development of IT happens at lightning speed and has a great impact on our society, every day we could observe new technical and engineering inventions. Moreover, it can be both a certain integration into the work process - automation of the daily routine, and part of leisure - communication and entertainment, etc. The entire complex of technologies and systems improve and facilitate the performance of everyday tasks, open new opportunities and remove borders. It is difficult to imagine a modern person without a mobile phone or tablet, which has almost continuous and unlimited access to the Internet or the worldwide global network. Today, a mobile device has a certain sacred meaning, it can contain a lot of different information or data. The nature and importance of this information may vary, but protection is a priority. And considering the developed dynamics and the uncertainty of some processes, engineers and developers face a difficult and important task to protect information systems and ensure reliable operation. To some extent, the mobile device can be considered the most problematic component. This device has a few advantages and features - this is exactly what makes it vulnerable to potential attackers and user actions can cause a few problems. This article is devoted to the problems of using mobile devices and protecting unstructured information. Protecting unstructured information on a mobile device is an important task from a cybersecurity perspective. Unstructured information can be in the form of text documents, emails, photos, videos, voice recordings, and other content stored on mobile devices. The main problems include loss or theft of a mobile device; operating system and software vulnerabilities; insufficient level of encryption and insufficient level of complexity of passwords; neglect of cyber hygiene. Existing engineering and architectural solutions do not always fulfill the task and may have problems with integration. Do not forget about the economic component. The analysis of the application area and the research results indicate that information protection in general is important and there is a demand for quick and effective solutions regarding the security of information systems in general and mobile devices. Only an integrated approach can provide an effective solution. The future of protecting unstructured information on mobile devices will be based on a combination of technological innovations and increased user awareness of cybersecurity issues. Some areas of development include the use of artificial intelligence (AI) and machine learning: AI can help develop advanced defense mechanisms that automatically detect anomalous or suspicious activity and block potential threats; biometric authentication, improvements in biometric authentication technologies, such as facial recognition, fingerprints, can provide more reliable protection of unstructured information; application of blockchain technologies: blockchain can play an important role in ensuring information security, as it allows data to be stored distributed and protected from changes; development of quantum-resistant encryption algorithms: with the development of quantum computers, there is a need for new encryption algorithms that can withstand the power of quantum hacking; privacy by design (Privacy by Design): designing mobile devices and applications with user privacy in mind will help protect unstructured information on mobile devices; user education and awareness: increasing users' awareness of cyber security and teaching them effective methods of protecting information on mobile devices will help reduce the risk of security incidents; development of the legislation and regulatory framework, improvement of the legislation and regulatory framework in the field of cyber security will contribute to the creation of a reliable environment for the protection of unstructured information. Securing unstructured information on mobile devices will rely on a combination of technological advances, user education, and collaboration between various parties such as developers, service providers, and lawmakers. Ensuring data security and privacy in the digital world remains a priority as the number of mobile devices and their use continues to grow. The modern user of mobile devices has certain requirements related to ergonomics and the level of information awareness. The development of the industry requires fast, reliable, and effective solutions that fall not only in the economic plane, but also in the plane of cyber security. The use of mobile devices can adapt to the fast-paced modern security needs of an organization and can be easily configured to meet specific requirements. A mobile device is convenient and affordable for many users, it is usually close to the user and can be used as an additional security element.
保护移动设备上的非结构化信息
移动设备对许多用户来说是方便和负担得起的,它通常离用户很近,可以用作额外的安全元素。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信