confidentiality

Subjective Human Rights in the Digital Age

In today’s world, where technology is developing at an incredible speed, automated information collection systems have become an integral part of our lives. They affect various aspects of society, including subjective human rights. This impact can be viewed from several perspectives. First of all, it is the significant advantages of automated systems. Such information collection systems significantly increase efficiency and accuracy in many areas. They allow for the rapid processing of large amounts of data, which facilitates informed decision-making.

Analysis of Current Trends and Approaches to Reliable and Secure Big Data Storage

The rapid accumulation of information assets requires new approaches to their storage and protection. The article is devoted to the analysis of modern approaches to storing large volumes of data, taking into account their efficiency, reliability and security. Key technologies such as cloud platforms, local solutions and distributed storage systems are considered, as well as the features of their application.

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

Principles of mediation as an alternative method to ensure human and citizen’s rights

The article is devoted to the analysis of principles of mediation as an alternative method to ensure human and citizen’s rights, enshrined in the Law of Ukraine “On mediation”, their relationships and interdependence. The research methodology includes a complex analysis and consolidation of the available scientific and theoretical materials, as well as shaping the corresponding conclusions. In the process of the research conducting, the authors used methods of scientific cognition: terminological, logical and semantic, functional, system and structural, logical and normative.

Information Protection in the System of Competence-based Characteristics Increasing and Evaluation of Auditor’s Knowledge Level

Continuous increasing knowledge of auditors is very important and yet difficult task Implementation of new technologies and automation of the learning process much easier and even cheaper this task. However, the automation of the process increasing the competence of auditor entails a number of threats related to unauthorized access, damage or theft of the information contained in the system.