Please use this identifier to cite or link to this item: https://irek.ase.md:443/xmlui/handle/123456789/4690
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCeban, Svetlana-
dc.date.accessioned2025-11-17T11:18:47Z-
dc.date.available2025-11-17T11:18:47Z-
dc.date.issued2025-05-
dc.identifier.urihttps://irek.ase.md:443/xmlui/handle/123456789/4690-
dc.descriptionCEBAN, Svetlana. Information Security Challenges in the Use of Digital Tools for Data Processing and Management. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 250-256. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.30en_US
dc.description.abstractThe accelerated pace of digitalization has fundamentally transformed the way information is collected, processed, and used. This process brings significant benefits but also major vulnerabilities in the field of information security. Digital technologies – ranging from common applications and online platforms to cloud-based solutions – have become indispensable for the efficiency of educational, economic, and administrative activities. However, the increasing reliance on technology exposes organizations to increasingly complex cyber threats. This article examines the main information security risks associated with the use of digital tools in data processing and management, drawing on theoretical approaches as well as recent practical examples. Three major categories of challenges are highlighted: technical (ransomware, phishing, software vulnerabilities, and dependence on cloud infrastructures), legal and regulatory (arising from GDPR, NIS2, and other European frameworks), and organizational and human (limited resources and the human factor as the weakest link). The conclusions emphasize that information security is not solely a technological issue but requires an integrated approach, combining advanced technical solutions with effective organizational policies and legal compliance. Practices such as data encryption, multi-factor authentication, continuous user training, and the principle of “privacy by design” are essential for strengthening organizational resilience against present and future digital threats. UDC: 004.056:[005.334+005.53]; JEL: M15, O33en_US
dc.language.isoenen_US
dc.publisherSEP ASEMen_US
dc.subjectinformation securityen_US
dc.subjectcyber threatsen_US
dc.subjectransomwareen_US
dc.subjectphishingen_US
dc.subjectcloud computingen_US
dc.subjectorganizational resilienceen_US
dc.titleInformation Security Challenges in the Use of Digital Tools for Data Processing and Managementen_US
dc.typeArticleen_US
Appears in Collections:2.Articole

Files in This Item:
File Description SizeFormat 
TEHNOLOGICAL INNOVATIONS IN DIGITAL SECURITY_pp250-256.pdf511.31 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.