<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-7-3-0-2</article-id><article-id pub-id-type="publisher-id">2840</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;PROBLEMS OF CLOUD SERVICES AND METHODS&amp;nbsp;OF PROTECTION AGAINST RISKS AND THREATS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;PROBLEMS OF CLOUD SERVICES AND METHODS&amp;nbsp;OF PROTECTION AGAINST RISKS AND THREATS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name><name xml:lang="en"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name></name-alternatives><email>egor2014ru@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2022</year></pub-date><volume>7</volume><issue>3</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2022/3/ИТ-2.pdf" /><abstract xml:lang="ru"><p>More and more people are starting to use cloud services for storing, editing and transferring data via the Internet, because it is very convenient, not too expensive and does not require large resource intensity. In addition, with the development of remote work, almost all companies use cloud services, some pay for services, others create their own. Such servers sometimes store very important data, the loss of which would lead to disaster and huge financial losses for companies. Therefore, it is necessary not to forget about security and the need to protect information efficiently and continuously. In connection with world changes, this year the popularity of cloud information security services has grown very much due to the sharp number of attacks on various Russian information systems and resources of various industries, and therefore more and more attention and finances have been paid to this area and its protection in general. In this article, we will consider cloud services, possible risks, available ways to solve threats, as well as possible development in this direction.</p></abstract><trans-abstract xml:lang="en"><p>More and more people are starting to use cloud services for storing, editing and transferring data via the Internet, because it is very convenient, not too expensive and does not require large resource intensity. In addition, with the development of remote work, almost all companies use cloud services, some pay for services, others create their own. Such servers sometimes store very important data, the loss of which would lead to disaster and huge financial losses for companies. Therefore, it is necessary not to forget about security and the need to protect information efficiently and continuously. In connection with world changes, this year the popularity of cloud information security services has grown very much due to the sharp number of attacks on various Russian information systems and resources of various industries, and therefore more and more attention and finances have been paid to this area and its protection in general. In this article, we will consider cloud services, possible risks, available ways to solve threats, as well as possible development in this direction.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>cloud</kwd><kwd>cloud services</kwd><kwd>cloud sites</kwd><kwd>security</kwd><kwd>cloud services security</kwd><kwd>information security</kwd><kwd>cloud security</kwd><kwd>types of cloud services</kwd><kwd>cloud service threats</kwd><kwd>cloud services market</kwd></kwd-group><kwd-group xml:lang="en"><kwd>cloud</kwd><kwd>cloud services</kwd><kwd>cloud sites</kwd><kwd>security</kwd><kwd>cloud services security</kwd><kwd>information security</kwd><kwd>cloud security</kwd><kwd>types of cloud services</kwd><kwd>cloud service threats</kwd><kwd>cloud services market</kwd></kwd-group></article-meta></front><back /></article>