<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2021-6-1-0-6</article-id><article-id pub-id-type="publisher-id">2375</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM</article-title><trans-title-group xml:lang="en"><trans-title>MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Nesterenko</surname><given-names>Vladimir Romanovich</given-names></name><name xml:lang="en"><surname>Nesterenko</surname><given-names>Vladimir Romanovich</given-names></name></name-alternatives><email>vladimir.nesterenko.workmail@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2021</year></pub-date><volume>6</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2021/1/ИТ_6_eCvYf48.pdf" /><abstract xml:lang="ru"><p>Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, for 2020, 39% of respondents noted the importance of protecting their cloud infrastructure, and 52% emphasized protecting public and hybrid clouds. The development of methods and means to counter threats to the security of cloud services is one of the priority tasks of the industry. In a quarantine environment, the security issues of cloud services are especially acute, as more and more users and organizations store important information in the cloud, conduct workflow in the cloud, and migrate or associate their business processes with cloud technologies. Most of the problems of information security of cloud services can be solved with the introduction of cryptographic protection, competent administrative measures on the part of the provider and service provider. These measures should take into account the individual requirements of the client</p></abstract><trans-abstract xml:lang="en"><p>Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, for 2020, 39% of respondents noted the importance of protecting their cloud infrastructure, and 52% emphasized protecting public and hybrid clouds. The development of methods and means to counter threats to the security of cloud services is one of the priority tasks of the industry. In a quarantine environment, the security issues of cloud services are especially acute, as more and more users and organizations store important information in the cloud, conduct workflow in the cloud, and migrate or associate their business processes with cloud technologies. Most of the problems of information security of cloud services can be solved with the introduction of cryptographic protection, competent administrative measures on the part of the provider and service provider. These measures should take into account the individual requirements of the client</p></trans-abstract><kwd-group xml:lang="ru"><kwd>cloud services</kwd><kwd>cloud services security</kwd><kwd>cloud</kwd><kwd>information security</kwd></kwd-group><kwd-group xml:lang="en"><kwd>cloud services</kwd><kwd>cloud services security</kwd><kwd>cloud</kwd><kwd>information security</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Information security in companies, https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C_%D0%B2_%D0%BA%D0%BE%D0%BC%D0%BF%D0%B0%D0%BD%D0%B8%D0%B8</mixed-citation></ref><ref id="B2"><mixed-citation>2. NIST SP 800-145, The NIST Definition of Cloud Computing. NIST Special publications</mixed-citation></ref><ref id="B3"><mixed-citation>3. Dovgal Vitaly Anatolyevich Cloud computing and analysis of information security issues in the cloud / / Bulletin of the Adygeya State University. Series</mixed-citation></ref><ref id="B4"><mixed-citation>4. https://ict.moscow/static/pdf/files/10_%D0%9F%D1%8F%D1%80%D0%BD.pdf</mixed-citation></ref><ref id="B5"><mixed-citation>5. https://lib.itsec.ru/articles2/cloud-security/oblachnye-vychisleniya-v-rossii-vozmozhnosti--vyzovy-i-riski</mixed-citation></ref><ref id="B6"><mixed-citation>6.Alshamrani, Adel &amp;amp; Myneni, Sowmya &amp;amp; Chowdhary, Ankur &amp;amp; Huang, Dijiang. (2019). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Communications Surveys &amp;amp; Tutorials. PP. 1-1. 10.1109/COMST.2019.2891891.&amp;nbsp;</mixed-citation></ref><ref id="B7"><mixed-citation>7. Bolshev Alexander Konstantinovich, Yanovsky Vladislav Vasilyevich Application of neural networks for detecting intrusions into computer networks // Bulletin of St. Petersburg State University. Series 10. Applied mathematics. Computer science. Management processes. 2010. No. 1. URL: https://cyberleninka.ru/article/n/primenenie-neyronnyh-setey-dlya-obnaruzheniya-vtorzheniy-v-kompyuternye-seti (accessed: 06.02.2021).</mixed-citation></ref><ref id="B8"><mixed-citation>8. PwC &amp;quot;Fear of the Clouds&amp;quot; Analytical study, October 2020 pwc-cloud-fear-survey. pdf</mixed-citation></ref></ref-list></back></article>