data storage

Legal Support of Information Security in the Field of Personal Data Protection

The article examines current issues related to the legal aspects of personal data protection in the context of ensuring information security amid the digitalization of society. It argues that personal data are among the most vulnerable assets in today’s information environment, and that improper processing or leaks can lead to significant violations of human rights and freedoms, undermine trust in state institutions, and create threats to national security.

Itil as a Component for Methodology Collecting, Processing, Storing, and Classifying Data in Accordance With SOC2 Type2 Requirements

In a world where the amount of electronic data is growing at a rapid pace every day, businesses face a new challenge: how to maintain control over information, make it secure, yet at the same time accessible and useful. The authors of the article see the answer to this question in the implementation of an ITSM component that ensures compliance with the international SOC 2 Type 2 standard. This standard is a kind of ‘trust mark’ for companies, as it confirms their ability to guarantee data security, confidentiality, and integrity.

Numerical Optimization Method for Clustering in Content-Based Image Retrieval Systems

The object of the study is the process of organizing a descriptor repository in content-based image retrieval systems. The subject of the study is a method of numerical optimization of descriptor clustering in a multidimensional space. The aim of this work is to develop a clustering optimization method in the Multidimensional Cube model to improve search efficiency. The core idea is to ensure a more uniform distribution of descriptors across clusters by adjusting interval boundaries in each dimension, which reduces imbalance in cluster density and improves retrieval performance.

Methodology for Collecting, Processing, Storing, and Classifying Data in Accordance With SOC2 Type2 Requirements

This article explores the creation of a data classification policy in line with SOC 2 Type 2 compliance requirements. SOC 2 Type 2 is a notable certification that attests to an organization’s ability to adhere to the Trust Services Criteria, including security, availability, processing integrity, confidentiality, and privacy.

Умови, стратегія та перспективи розвитку інформаційних технологій

Розкрито сучасне розуміння феномена інформаційного суспільства, подані показники, тенденції й прогнози впровадження інформаційних технологій у світі та його вплив на глобальний розвиток. У цьому контексті розглянуто соціокультурні зрушення в Україні, безпосередньо пов’язані зі впровадженням і використанням інформаційних технологій, зокре- ма: поширення нових форм масової комунікацій, трансформація та розвиток систем «циф- рової» демократії та електронного урядування, сучасних технологій. Розкрито стан проблеми розвитку інформаційних технологій.

Архітектура багаторівневої системи управління енергоефективністю регіону

The list of problems that can be solved by multilevel system of energy efficiency of the region were determined. Requirements for the implementation of each system component were formulated. It was shown that the technological process control’s components should provide processing of intensive data streams in real time. Also components have to satisfy limitations on size, power consumption and cost.