Cybersecurity of Intellectual Information Aggregation Processes into Digital Archives

dc.contributor.authorTsyrulnev, Yuriy
dc.date.accessioned2026-02-26T09:43:33Z
dc.date.available2026-02-26T09:43:33Z
dc.date.issued2025
dc.description.abstractThe article addresses the problem of cybersecurity in intellectual information aggregation (IIA) processes within digital archives, which arise during the automated collection, structuring, semantic enrichment, and analysis of heterogeneous data using artificial intelligence (AI), machine learning (ML), and large language models (LLMs). The study focuses on identifying vulnerabilities of IIA processes and their mathematical formalization across stages such as digitization, image processing, optical character recognition (OCR), classification, indexing, and archival system creation. Particular attention is given to formalizing cyber threats, including unauthorized access, integrity violations, metadata forgery, adversarial attacks on AI/ML models, data manipulation, prompt injection, data exfiltration, and digital signature forgery. For each threat category, mathematically grounded countermeasures are proposed, including encryption, multi‑factor authentication, monitoring, anomaly detection, access control, metadata protection, and adversarial training. The paper emphasizes the emergent properties of combined defenses, highlighting the resilience of digital archives against cyber threats that arise from the interaction of individual safeguards. The proposed models can be applied to the assessment and strengthening of information system security in the context of state and societal digital transformation.Practical aspects of implementing digital archive creation processes have been validated through patented solutions for converting large collections of paper documents into digital information resources [15]. To support the functioning of intellectual information aggregation processes, specialized software packages are employed, themodules of Digital Docs®Technology, registered as a copyrighted work [16]. Practical deployment of the proposed solutions is carried out within the activitiesof DIGITAL DOCS®,registered as a trademark [17].
dc.format.pagerangeP. 74-90
dc.identifier.citationTsyrulnev, Y. Cybersecurity of Intellectual Information Aggregation Processes into Digital Archives / Yuriy Tsyrulnev // Theoretical and Applied Cybersecurity: scientific journal. – 2025. – Vol. 7, No. 2. – P. 74-90. – Bibliogr.: 18 ref.
dc.identifier.doihttps://doi.org/10.20535/tacs.2664-29132025.2.343769
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/79072
dc.language.isoen
dc.publisherIgor Sikorsky Kyiv Polytechnic Institute
dc.publisher.placeKyiv
dc.relation.ispartofTheoretical and Applied Cybersecurity: scientific journal, Vol. 7, No. 2
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/deed.uk
dc.subjectDigital Information Resources
dc.subjectDigital Archives
dc.subjectIntellectual Information Aggregation
dc.subjectCybersecurity
dc.subjectCyber Threats
dc.subjectArtificial Intelligence
dc.subjectMachine Learning
dc.subjectLarge Language Models
dc.subject.udc004.89
dc.titleCybersecurity of Intellectual Information Aggregation Processes into Digital Archives
dc.typeArticle

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
74-90.pdf
Розмір:
7.84 MB
Формат:
Adobe Portable Document Format
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
8.98 KB
Формат:
Item-specific license agreed upon to submission
Опис: