“sanoat va xizmat ko'rsatish sohalarining raqamli transforma t siyasi: tendensiyalar, boshqaruv, strategiyalar” Xalqaro ilmiy-amaliy anjuman


“DIGITAL TRANSFORMATION OF INDUSTRY AND SERVICES: TRENDS, MANAGEMENT



Download 5,93 Mb.
Pdf ko'rish
bet513/531
Sana13.07.2022
Hajmi5,93 Mb.
#787448
1   ...   509   510   511   512   513   514   515   516   ...   531
Bog'liq
13714 1 5503376EFCE8575E605B9B65ADF82BB787B9A90D

“DIGITAL TRANSFORMATION OF INDUSTRY AND SERVICES: TRENDS, MANAGEMENT, 
STRATEGIES”
448
penalties), businesses should consider whether the suggested technological solution can be 
scaled back, or more assurances from the provider can be secured.
Only a systematic approach to data security in a digital transformation endeavor can mitigate 
digital business risks. Among the paths to creating a strategic data protection capacity are: 

Create a strategy:
The key steps in beginning the data security journey include developing a strategy, creating 
a policy, and categorizing data. These processes involve identifying the present and target states, 
categorizing data, documenting data flows, developing policies and procedures, and developing 
an organizational roadmap. 

Putting in place data privacy safeguards:
Capabilities for data protection BYOK (bring your own key), which enables encryption with 
local key control, is a critical element that must evolve to facilitate multi-cloud operations. 

Control 1 
entails implementing database and application-level encryption. 

Control 2
– Implement tokenization and database access monitoring with robust 
authentication. 

Control 3
- Data loss prevention (DLP) measures should be established to guarantee that 
sensitive data does not leave the company or reach unauthorized individuals inside or outside the 
business. 

Control 4
– To maintain security across multiple applications and to establish a 
trustworthy or untrusted environment, public key infrastructure (PKI) and certificate key 
management should be employed. 

Control 5
– A Cloud Access Security Broker (CASB) should be utilized to monitor, 
encrypt, and prevent sensitive data from being exposed in the cloud. 
The term "residual risk" is vital to remember since technology connected to data breaches is 
not impenetrable. 

Download 5,93 Mb.

Do'stlaringiz bilan baham:
1   ...   509   510   511   512   513   514   515   516   ...   531




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish