The article examines the key aspects and recommendations for implementing data protection in distributed data storage systems (DDSS) for small businesses. It explores methods of ensuring information security, including incident monitoring, two-factor authentication, and file encryption. The study includes tests of the fault tolerance of DDSS and the robustness of authentication mechanisms under simulated DOS and brute force attacks using fuzzing techniques. Proposed methods include the integration of platforms for incident monitoring (MISP, Wazuh) and the use of TOTP for two-factor authentication. Additionally, it discusses data encryption mechanisms and access management using JWT.
Keywords: information security, fuzzing, monitoring, WAF, data storage system, data encryption, two-factor authentication, small business, fault tolerance