Cybersecurity of Intellectual Information Aggregation Processes into Digital Archives

Authors

  • Yuriy Tsyrulnev DIGITAL DOCS® LLC, Ukraine

DOI:

https://doi.org/10.20535/tacs.2664-29132025.2.343769

Abstract

The article addresses the problem of cybersecurity in intellectual information aggregation (IIA) processes within digital archives, which arise during the automated collection, structuring, semantic enrichment, and analysis of heterogeneous data using artificial intelligence (AI), machine learning (ML), and large language models (LLMs). The study focuses on identifying vulnerabilities of IIA processes and their mathematical formalization across stages such as digitization, image processing, optical character recognition (OCR), classification, indexing, and archival system creation. Particular attention is given to formalizing cyber threats, including unauthorized access, integrity violations, metadata forgery, adversarial attacks on AI/ML models, data manipulation, prompt injection, data exfiltration, and digital signature forgery. For each threat category, mathematically grounded countermeasures are proposed, including encryption, multi‑factor authentication, monitoring, anomaly detection, access control, metadata protection, and adversarial training. The paper emphasizes the emergent properties of combined defenses, highlighting the resilience of digital archives against cyber threats that arise from the interaction of individual safeguards. The proposed models can be applied to the assessment and strengthening of information system security in the context of state and societal digital transformation. Practical aspects of implementing digital archive creation processes have been validated through patented solutions for converting large collections of paper documents into digital information resources [15]. To support the functioning of intellectual information aggregation processes, specialized software packages are employed, the modules of Digital Docs® Technology, registered as a copyrighted work [16]. Practical deployment of the proposed solutions is carried out within the activities of DIGITAL DOCS®, registered as a trademark [17].

Downloads

Published

2025-11-17

Issue

Section

Intelligent Data analysis methods in cybersecurity