Modern methods for protecting and storing data in computer systems to ensure their fault tolerance

dc.contributor.authorYanko, Alina
dc.contributor.authorMychailichenko, Oleksii
dc.contributor.authorHlushko, Alina
dc.date.accessioned2025-04-03T08:30:15Z
dc.date.available2025-04-03T08:30:15Z
dc.date.issued2024
dc.description.abstractThe study's relevance stems from the fact that, in today’s world, where digital technologies permeate all areas of life and cyber threats continuously adapt, traditional methods of identifying critical vulnerabilities that rely on internal data often lag behind the evolution of these threats, leaving computer systems critically vulnerable. Ensuring the fault tolerance of computer systems is essential for stability and protection against such threats. The research methodology includes analyzing modern approaches to ensuring fault tolerance in relation to both hardware and software, utilizing cybersecurity models, redundancy, and data integrity at both the routing and system levels. Reliability was evaluated through theoretical analysis and application of existing technologies, as well as analysis of available system failure statistics based on open data sources. The main goal of the research was to develop recommendations and practical solutions to enhance the fault tolerance of computer systems through the integration of software and hardware protection methods based on an analysis of existing solutions. The task was to ensure system resilience to hardware-software failures before, during, and after their occurrence, thereby minimizing downtime of the hardware-software complex and data loss. The research demonstrated that a comprehensive approach provides the best protection, with the ability to identify issues before they arise. This includes component redundancy of both software and hardware types and the implementation of diagnostic and predictive failure systems. Systems equipped with modern anomaly detection methods can respond much faster to potential threats and minimize losses, while hardware systems with active monitoring and automatic switchover to backup components ensure continuity of processes in the event of critical technical failure. Future technologies, such as using artificial intelligence to analyze system state and predict potential failures, will significantly increase the efficiency and protection of hardware-software systems. However, they currently face compatibility challenges when combined with both legacy and new equipment, limiting their widespread adoption. The results of the research show that systems utilizing a hybrid monitoring approach, combining software and hardware protection, better adapt to changing operating conditions and demonstrate higher fault tolerance.
dc.format.pagerangeP. 72-81
dc.identifier.citationYanko, A. Modern methods for protecting and storing data in computer systems to ensure their fault tolerance / Alina Yanko, Oleksii Mychailichenko, Alina Hlushko // Theoretical and Applied Cybersecurity: scientific journal. – 2024. – Vol. 6, No. 1. – P. 72-81. – Bibliogr.: 26 ref.
dc.identifier.doihttps://doi.org/10.20535/tacs.2664-29132024.1.315086
dc.identifier.orcid0000-0003-2876-9316
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/73225
dc.language.isoen
dc.publisherIgor Sikorsky Kyiv Polytechnic Institute
dc.publisher.placeKyiv
dc.relation.ispartofTheoretical and Applied Cybersecurity: scientific journal, Vol. 6, No. 1
dc.subjectfault tolerance
dc.subjecthardware and software systems
dc.subjectpositional number systems
dc.subject.udc004.056.2-5:681.5.09
dc.titleModern methods for protecting and storing data in computer systems to ensure their fault tolerance
dc.typeArticle

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
315086-737001-1-10-20241216.pdf
Розмір:
1.29 MB
Формат:
Adobe Portable Document Format
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
8.98 KB
Формат:
Item-specific license agreed upon to submission
Опис: