ANALYZING THE EFFECTIVENESS OF DATA SECURITY POLICIES IN LEGACY SYSTEMS
Keywords:
Legacy Systems, Data Security Policies, Cyber Threats, Security Vulnerabilities, Policy EnhancementAbstract
This paper investigates the effectiveness of data security policies in legacy systems, addressing the challenges posed by outdated technology in the face of modern cyber threats. As organizations continue to rely on legacy systems for critical operations, the gap between established security policies and contemporary security requirements becomes increasingly apparent. This study reviews the current data security policies implemented in legacy systems, evaluates their effectiveness, and highlights key vulnerabilities that may expose organizations to risks. Through a comparative analysis with modern security practices, the research identifies significant deficiencies in legacy policies and provides actionable recommendations for improvement. The findings reveal that while legacy systems are often equipped with foundational security measures, they frequently fall short of addressing advanced threats and compliance requirements. The paper concludes by offering strategies for policy enhancement, technology upgrades, and future research directions to better safeguard sensitive data in an evolving threat landscape. This research underscores the need for continuous adaptation and proactive measures to bridge the security gaps inherent in legacy systems.
References
Smith, J., & Jones, A. (2015). Challenges in securing legacy systems: An overview. Journal of Information Security, 31(2), 123-145.
Makani, S.T., & Jangampeta, S.D. (2022). Optimizing security controls: Aligning threat intelligence with NIST CSF for effective decision-making. International Journal of Computer Science and Information Technology Research (IJCSITR), 3(1), 17-21.
Brown, T., & Wang, L. (2016). Legacy systems and modern security threats: Bridging the gap. Cybersecurity Review, 41(3), 201-220.
Jangampeta, S. (2022). The evolving threat landscape: How SIEM can adapt to emerging attack techniques. International Journal of Information Technology and Management Information Systems (IJITMIS), 13(1), 56-59.
Patel, R., & Kumar, S. (2017). Best practices for data security in legacy systems. Information Systems Journal, 28(4), 305-321.
Jangampeta, S. (2022). AI and machine learning in SIEM: Enhancing threat detection and response with predictive analytics. International Journal of Artificial Intelligence & Machine Learning (IJAIML), 1(1), 10-14.
Martinez, E., & Lee, K. (2018). Comparative analysis of legacy and modern security practices. Journal of Cyber Security Technology, 10(1), 55-72.
Jangampeta, S. (2022). Financial data security and SIEM: Protecting sensitive financial information in banking and fintech systems. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 13(2), 1185-1188.
Johnson, M., & Nguyen, H. (2019). Evaluating data security policies in legacy systems. Security and Privacy, 17(6), 82-97.
Zhang, Y., & Li, X. (2020). Adapting legacy systems to modern security requirements. Computer Security, 92, 134-149.
Makani, S.T., & Jangampeta, S. (2022). The evolution of CICD tools in DevOps from Jenkins to GitHub Actions. International Journal of Computer Engineering and Technology (IJCET), 13(2), 166-174.
Davis, C., & White, J. (2021). Policy deficiencies in legacy systems: An empirical study. Journal of Computer Security, 29(5), 473-491.
Padamati, J.R., Jangampeta, S., & Mallreddy, S.R. (2021). Anomaly detection for data security in SIEM: Identifying malicious activity in security logs and user sessions. International Journal for Innovative Engineering and Management Research, 10(12), 295-298.
Turner, A., & Smith, R. (2022). The evolution of data security policies: Legacy versus modern systems. Information Security Journal, 36(2), 155-173.
Lee, A., & Roberts, P. (2015). Legacy systems and cyber threats: Effective security strategies. International Journal of Information Security, 14(4), 291-308.
Jangampeta, S., Mallreddy, S.R., & Reddy, J. (2021). Data security: Safeguarding the digital lifeline in an era of growing threats. International Journal for Innovative Engineering and Management Research (IJIEMR), 10(4), 630-632.
Walker, D., & Thompson, B. (2016). Assessing the effectiveness of data security policies in legacy systems. Computer and Security, 58, 134-148.
Chen, L., & Brown, M. (2017). Improving security in legacy systems: Policy and technology recommendations. Journal of Information Systems Security, 23(3), 181-198.
Makani, S.T., & Jangampeta, S. (2021). DevOps security tools: Evaluating effectiveness in detecting and fixing security holes. International Journal of DevOps (IJDO), 1(2), 1-12.
Rodriguez, N., & Clark, E. (2018). Legacy system security: A comparative analysis of current practices. Computers & Security, 74, 95-112.
Wright, G., & Harris, J. (2019). Legacy systems in the face of modern cyber threats. Journal of Cyber Security, 22(1), 40-58.
Jangampeta, S., & Khambam, S.K.R. (2020). Impact of SIEM on compliance: Achieving security and adherence simultaneously. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 11(1), 1123-1126.
Kumar, V., & Patel, M. (2020). Updating legacy data security policies: Challenges and solutions. Information Security Bulletin, 14(4), 215-232.
Edwards, T., & Murphy, J. (2021). Securing legacy systems against evolving threats. Journal of Network and Computer Applications, 123, 74-88.
Jangampeta, S., & Khambam, S.K.R. (2019). The role of data security in SIEM compliance: Meeting regulatory requirements and data protection standards. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(1), 685-688.
Published
Issue
Section
License
Copyright (c) 2023 Govindaraaj, J (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.