MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, for 2020, 39% of respondents noted the importance of protecting their cloud infrastructure, and 52% emphasized protecting public and hybrid clouds. The development of methods and means to counter threats to the security of cloud services is one of the priority tasks of the industry. In a quarantine environment, the security issues of cloud services are especially acute, as more and more users and organizations store important information in the cloud, conduct workflow in the cloud, and migrate or associate their business processes with cloud technologies. Most of the problems of information security of cloud services can be solved with the introduction of cryptographic protection, competent administrative measures on the part of the provider and service provider. These measures should take into account the individual requirements of the client
Nesterenko R.V., Maslovа M.A. Modern challenges and threats information security public cloud making and methods of work with them // Research result. Information technologies. – Т.6, №1, 2021. – P. 48-54. DOI: 10.18413/2518-1092-2021-6-1-0-6
While nobody left any comments to this publication.
You can be first.
1. Information security in companies, https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C_%D0%B2_%D0%BA%D0%BE%D0%BC%D0%BF%D0%B0%D0%BD%D0%B8%D0%B8
2. NIST SP 800-145, The NIST Definition of Cloud Computing. NIST Special publications
3. Dovgal Vitaly Anatolyevich Cloud computing and analysis of information security issues in the cloud / / Bulletin of the Adygeya State University. Series
4. https://ict.moscow/static/pdf/files/10_%D0%9F%D1%8F%D1%80%D0%BD.pdf
5. https://lib.itsec.ru/articles2/cloud-security/oblachnye-vychisleniya-v-rossii-vozmozhnosti--vyzovy-i-riski
6.Alshamrani, Adel & Myneni, Sowmya & Chowdhary, Ankur & Huang, Dijiang. (2019). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Communications Surveys & Tutorials. PP. 1-1. 10.1109/COMST.2019.2891891.
7. Bolshev Alexander Konstantinovich, Yanovsky Vladislav Vasilyevich Application of neural networks for detecting intrusions into computer networks // Bulletin of St. Petersburg State University. Series 10. Applied mathematics. Computer science. Management processes. 2010. No. 1. URL: https://cyberleninka.ru/article/n/primenenie-neyronnyh-setey-dlya-obnaruzheniya-vtorzheniy-v-kompyuternye-seti (accessed: 06.02.2021).
8. PwC "Fear of the Clouds" Analytical study, October 2020 pwc-cloud-fear-survey. pdf