Technologies for Protecting Intangible Assets from Confidentiality Attacks
Abstract
The article considers the essence of an intangible asset, its role in the modern economy, and the importance of protecting intangible assets from confidentiality attacks. In particular, the properties of intangible assets that determine the existence of relevant threats to information security that are not inherent in traditional tangible assets are considered. An approach to analyzing existing technologies for protecting intangible assets based on the data life cycle is also proposed and their comparative analysis is carried out. Statement of the problem: to review existing technologies for protecting intangible assets and to propose a methodology for selecting one or more technologies for use in a commercial enterprise. Results: the significance of intangible assets for a commercial enterprise is assessed and the relevance of the problem of their proper protection is confirmed, an overview of existing protection technologies for various stages of the data life cycle is conducted, and current issues in certain areas are identified. Practical significance: the proposed approaches can be used by specialists in commercial and non-profit organizations when designing information security systems to protect intangible assets. Discussion: An approach to building a technological system for protecting intangible assets based on the data life cycle is presented.
Full Text:
PDF (Russian)References
[On Approval of the Federal Accounting Standard FAS 14/2022 "Intangible Assets": Order of the Ministry of Finance of the Russian Federation No. 86n of May 30, 2022]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_420322 (In Russ.)
[On Commercial Secrecy (with The Amendments and Additions): Federal Law No. 98-FZ of July 29, 2004: Adopted by the State Duma on 9 July, 2004]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_48699 (In Russ.)
Civil Code of the Russian Federation (Part Four, (with The Amendments and Additions): Federal Law No. 230-FZ of December 18, 2006: Adopted by the State Duma on November 24, 2006]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_64629/ (In Russ.)
J.M. Borky, T.H. Bradley, "Protecting Information with Cybersecurity", Effective Model-Based Systems Engineering, Cham: Springer, pp. 345-404, 2019. https://doi.org/10.1007/978-3-319-95669-5_10
R. Moro-Viscont, "The Valuation of Intangible Assets: An Introduction", Artificial Intelligence Valuation, Cham: Palgrave Macmillan, pp. 41-129, 2024 https://doi.org/10.1007/978-3-031-53622-9_2
M. A. Geistfeld, "Protecting Confidential Information Entrusted to Others in Business Transactions: Data Breaches, Identity Theft, and Tort Liability", DePaul Law Review, vol. 66, issue 2, pp. 385-412, 2017. Available at: https://via.library.depaul.edu/law-review/vol66/iss2/4
G. Garbuzov, "Problems of Definitions and Setting Goals for Data Leaks Protection", International Journal of Open Information Technologies, vol. 12, no. 5, pp. 185-191, 2024. EDN: ZXVIYQ (In Russ.)
R. Trequattrini, A. Lardo, B. Cuozzo, S. Manfredi, "Intangible assets management and digital transformation: evidence from intellectual property rightsintensive industries", Meditari Accountancy Research, vol. 30, no. 4, pp. 989-1006, 2022. https://doi.org/10.1108/MEDAR-03-2021-1216
E. Haber, T. Zarsky, "Cybersecurity for Infrastructure: A Critical Analysis", Florida State University Law Review, vol. 44, pp. 515-577, 2018. Available: https://ir.law.fsu.edu/lr/vol44/iss2/3
M.M. Pană, A.M. Titu, A.M. Ungureanu, "Strategies for Protecting the Intellectual Capital in the Knowledge-Based Organizations", Proceedings on The XXVII-th International Conference of Inventics "INVENTICA 2023", Sciendo, 2023. https://doi.org/10.2478/9788367405201-007
Y. Nugraha, A. Martin, "Cybersecurity service level agreements: understanding government data confidentiality requirements", Journal of Cybersecurity, pp. 1-19, 2022. https://doi.org/10.1093/cybsec/tyac004
"Cost of a Data Breach Report 2023", IBM Security, 2023. [Online]. Available: https://www.ibm.com/reports/data-breach
"2023 Data Breach Report", Washington State Attorney General’s office, 2023. 15 p. [Online]. Available: https://newsletter.radensa.ru/wp-content/uploads/2023/12/DBR2023-FINAL.pdf
"2023 Data Breach Investigations Report", Verizon, 2023. [Online]. Available: https://www.verizon.com/business/resources/reports/dbir
N. Allahrakha, "Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age", Legal Issues in the Digital Age, vol. 4, no. 2, pp. 78-121, 2023. https://doi.org/10.17323/2713-2749.2023.2.78.121
W. S. Admass, Y. Y. Munaye, A. A. Diro, "Cyber security: State of the art, challenges and future directions", Cyber Security and Applications, vol. 2, article number: 100031, 2024. https://doi.org/10.1016/j.csa.2023.100031
DAMA International, Data Management Body Of Knowledge, 2nd ed. Basking Ridge, New Jersey: Technics Publications, 2017. 588 p.
E. Ferrara, Determine The Business Value Of An Effective Security Program – Information Security Economics 101, Forrester Research, Inc., October 2, 2012.
A. Zarubin, B. Smirnov, S. Kharitonov, D. Denisov, "Main drivers and trends of DLP systems development in the Russian Federation", Journal of Applied Informatics, vol. 15, no. 3, 2020. doi: https://doi.org/10.37791/2687-0649-2020-15-3-75-90 (In Russ.)
I. Herrera Montano, J.J. García Aranda, J. Ramos Diaz, et al., "Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat”, Cluster Computing, vol. 25, pp. 4289-4302, 2022. https://doi.org/10.1007/s10586-022-03668-2
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162