METHODS FOR PROTECTING PERSONAL DATA IN CYBERSPACE INCLUDE ENCRYPTION, BIOMETRIC PROTECTION, AND USER SECURITY
Keywords:
Personal data protection, cybersecurity, encryption, biometric authentication, user awareness, digital security, cyber threats, data integrity, multi-factor authentication.Abstract
The article explores modern methods of protecting personal data in cyberspace, focusing on encryption technologies, biometric protection systems, and user security practices. In today’s digital environment, the growing volume of personal data circulating through online platforms and IoT devices has increased the risk of unauthorized access and cyberattacks. Encryption is highlighted as the foundation of data protection, ensuring confidentiality and integrity through cryptographic algorithms. Biometric protection systems — including fingerprint, facial, and voice recognition — provide personalized and secure authentication methods that minimize password-related vulnerabilities. Moreover, user awareness and behavior play a vital role in cybersecurity, emphasizing the importance of multi-factor authentication, strong password policies, and safe browsing habits. The study analyzes global cybersecurity frameworks and presents recommendations for improving individual and organizational data security strategies. The findings show that integrating encryption with biometric technologies and responsible user behavior forms a comprehensive and effective approach to data protection in the digital era.
Downloads
References
Stallings, W. (2020). Cryptography and Network Security: Principles and Practice. Pearson Education.
Kizza, J. M. (2019). Guide to Computer Network Security. Springer.
Jain, A. K., Ross, A., & Nandakumar, K. (2021). Introduction to Biometrics. Springer.
Schneier, B. (2018). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
Shamir, A. (2019). “How to Share a Secret.” Communications of the ACM, 22(11), 612–613.
ISO/IEC 24745:2011. Information Technology — Security Techniques — Biometric Information Protection. International Organization for Standardization.
Alhassan, M., & Samaila, M. (2020). “A Review on Encryption and Biometric Security Integration in Cloud Computing.” International Journal of Computer Applications, 177(42), 1–8.
European Union Agency for Cybersecurity (ENISA). (2022). Data Protection and Privacy in the Digital Era. ENISA Report.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All content published in the Journal of Applied Science and Social Science (JASSS) is protected by copyright. Authors retain the copyright to their work, and grant JASSS the right to publish the work under a Creative Commons Attribution License (CC BY). This license allows others to distribute, remix, adapt, and build upon the work, even commercially, as long as they credit the author(s) for the original creation.