THE BASICS OF CREATING SECURE DATA ARCHITECTURES FOR FINANCIAL ORGANIZATIONS
Di Feng , Director of Cyber Data Risk & Resilience Division, China/Canada (Montreal, Quebec)Abstract
The article discusses approaches to the development of systems that minimize the risks of unauthorized access, leaks, and data integrity violations. Special attention is paid to the introduction of security mechanisms at the design stage, the adaptation of architectural models to the conditions of the digital economy, and the use of modern technologies. Due to increased cyber threats and changes in the norms that determine the need to create secure data architectures in financial organizations. The work is based on the concepts of Privacy by Design and security by Design, as well as technological solutions, including blockchain, and adaptive authentication.
The approaches presented in the article include micro-segmentation of networks to isolate components, restriction of user privileges, and the use of cryptographic methods to protect information. These measures ensure compliance with the requirements of the digital environment. Scientific articles by foreign authors, as well as materials that are publicly available on the Internet, were used as sources.
The information presented in the article is intended for professionals involved in information security, system architecture development, and project management in the financial sector. They will also be useful to other scientific specialists. The focus of the work is on the need for an integrated approach, updating solutions in response to modern threats.
Keywords
Data architecture, financial organizations, information security
References
M Babu. S., Raj K. B., Devi D. A. Data security and protection of confidential data using the "projected confidentiality" technology //2nd International Conference of the Central Committee on Innovations in the field of big data for sustainable cognitive Computing: BDCC 2019. – Springer International Publishing House, 2021. – Pp. 177-189.
Vedha B. Yu., Vasandani M. S., Vedha A. E. P. B. Designing enterprise architecture for the transformation of online financial services //Syncron: Dan Penelian Tech Informatics magazine. – 2023. - vol. 7. – No. 4. – pp. 2670-2678.
Shbad S. A. Research on how to make decisions for software development //IEEE Access. – 2022. – Vol. 10. – pp. 128983-128993.
Massachusetts, N. K., N. N. Distributed servers: security and implementation problems //IEEE Security & Privacy. – 2020. – Vol. 19. – No. 1. – pp. 54-64.
Avaishe F. M. et al. Security in the design of big data processing platforms in cloud computing //IEEE Standards transactions on engineering management. – 2021. – vol. 69. – No. 6. – pp. 3676-3693.
Pashtova, L. Financial architecture of corporations in digital reality / L. Pashtova // Finance and credit. 2024. Volume 30. pp.507-526.
Flugheft K. A., Sufi E. S., Sawyer R. Information architecture for data disclosure //Entropy. – 2022. – Vol. 24. – No. 5. – p. 670.
Sen. T. Building a financial data control regime based on blockchain technology //ICIDC 2023: Proceedings of the 2nd International Conference on Information Economics, Data Modeling and Cloud Computing, ICIDC 2023, June 2-4, 2023, Nanchang, China. – European Alliance for Innovation, 2023. – vol. 4. – p. 193.
Yi G. O. M. An approach to design to minimize data theft // International Conference 2022 on Computational Science and Computational Intelligence (CSCI). – IEEE, 2022. – pp. 983-989.
Boldrin L., Sellitto G. P., Tepandi J. The architect of the TOOP // The principle of monotonous use: The TOOP project. - Cham: Springer International Publishing, 2021. – pp. 126-140.
Anikeeva V.V., Selifanov V.V. Risk assessment in the process of determining the architecture of the system // Security of digital technologies. – 2022. – № 4 (107). – Pp. 52-62.
Christiana I. et al. Optimizing the implementation of big data to create business value and architecture in the proposed banking industry: a systematic review //The 2023 International Conference on Computer Science, Information Technology and Engineering (ICCoSITE). – IEEE, 2023. – pp. 667-672.
Financial services. [Electronic resource] Access mode: https://cpl.thalesgroup.com/industry/financial-data-security (date of access: 11/19/2024).
Data protection and cybersecurity in China: annual review for 2023 and prospects for 2024. [Electronic resource] Access mode:https://www.twobirds.com/en/insights/2024/china/china-data-protection-and-cybersecurity-annual-review-of-2023-and-outlook-for-2024 - 1 (date of application: 11/19/2024).
There are 3 months left before the new data protection rules come into force in China. [Electronic resource] Access mode: https://rouse.com/insights/news/2024/3-month-countdown-to-the-china-s-new-data-security-regulation-key-trends-and-compliance-insights (date of access: 11/19/2024).
Article Statistics
Copyright License
Copyright (c) 2024 Di Feng

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.