<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-7-4-0-4</article-id><article-id pub-id-type="publisher-id">2963</article-id><article-categories><subj-group subj-group-type="heading"><subject>AUTOMATION AND CONTROL</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;IT INFRASTRUCTURE RISKS AND METHODS FOR THEIR SOLUTION&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;IT INFRASTRUCTURE RISKS AND METHODS FOR THEIR SOLUTION&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Alexandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Alexandrovna</given-names></name></name-alternatives><email>mashechka-81@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2022</year></pub-date><volume>7</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2022/4/4_ИТ_НР_0SStOLy.pdf" /><abstract xml:lang="ru"><p>Changes in global trends in IT infrastructure in business do not stand still, and one of the developing areas is peripheral and cloud computing. So in recent years, many companies have been integrated into the Russian markets due to sanctions or completely left the market, then there is an urgent need to change, refine and create new information security services that require competent, constant protection of all processed information. It is necessary to make sound financial investments in the protection of this direction. This paper discusses the pros and cons of using cloud services, as well as possible risks, solutions and directions for the development of cloud information security services.</p></abstract><trans-abstract xml:lang="en"><p>Changes in global trends in IT infrastructure in business do not stand still, and one of the developing areas is peripheral and cloud computing. So in recent years, many companies have been integrated into the Russian markets due to sanctions or completely left the market, then there is an urgent need to change, refine and create new information security services that require competent, constant protection of all processed information. It is necessary to make sound financial investments in the protection of this direction. This paper discusses the pros and cons of using cloud services, as well as possible risks, solutions and directions for the development of cloud information security services.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>risks</kwd><kwd>information security services</kwd><kwd>cyber attacks</kwd><kwd>information security</kwd><kwd>cloud</kwd><kwd>IT infrastructure</kwd><kwd>theft</kwd></kwd-group><kwd-group xml:lang="en"><kwd>risks</kwd><kwd>information security services</kwd><kwd>cyber attacks</kwd><kwd>information security</kwd><kwd>cloud</kwd><kwd>IT infrastructure</kwd><kwd>theft</kwd></kwd-group></article-meta></front><back><ack><p>The work was carried out within the framework of the Agreement dated 30.06.2022 No. 40469-21/2022-K.</p></ack><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Nesterenko V.R. Modern challenges and threats to the information security of public cloud solutions and ways of working with them / V.R. Nesterenko, M.A. Maslova // Scientific result. Information technology. 2021. T. 6. № 1. P. 48-54.</mixed-citation></ref><ref id="B2"><mixed-citation>Ozhiganova M.I. Methods and means of analyzing threats to the local computer network of the enterprise / M.I. Ozhiganova, A.O. Sheiko, E.M. Isakova, A.O. Mironova//in the collection: digital transformation of science and education. Collection of scientific works of the II International Scientific and Practical Conference. 2021. P. 264-270.</mixed-citation></ref><ref id="B3"><mixed-citation>Mironova A.O. Application of the methodology for assessing threats to information security / A.O.&amp;nbsp;Mironova, Yu.Yu. Goncharenko, A.S. Gogol, A.N. Frolova // Energy installations and technologies. 2021. T.&amp;nbsp;7. № 4. P. 71-75.</mixed-citation></ref><ref id="B4"><mixed-citation>Maslova M.A. Problems of cloud services and methods of protection against risks and threats / M.A.&amp;nbsp;Maslova, E.S. Kuzminykh // Research result. Information technology. 2022. T. 7. № 3. P. 14-22</mixed-citation></ref><ref id="B5"><mixed-citation>Kucherova H. Modeling the stakeholder&amp;#39;s behavior on the base of online inquiries about tertiary / H.&amp;nbsp;Kucherova, D. Ocheretin, Y. Honcharenko, O. Mykoliuk // В сборнике: 2021 11th International Conference on Advanced Computer Information Technologies, ACIT 2021 &amp;ndash; Proceedings. 11. 2021. P. 35-40.</mixed-citation></ref><ref id="B6"><mixed-citation>Averyanov V.S. Assessment of the security of cyberphysical systems based on the general attack graph / V.S. Averyanov, I.N. Kartsan // South Siberian Scientific Bulletin. 2022. № 1(41). P. 30-35.</mixed-citation></ref><ref id="B7"><mixed-citation>Savelyev R.N. The main methods of detecting information security violations according to monitoring data of the satellite network ground control complex / R.N. Savelyev, I.N. Kartsan // In the collection: Actual problems of aviation and cosmonautics. 2021. P. 405-408.</mixed-citation></ref><ref id="B8"><mixed-citation>Goncharenko Yu.Yu. Qualitative assessment of methods for the development of automated means / Yu.Yu. Goncharenko, G.S. Pogulyay, V.V. Pelis, M.G. Shcherbachenko // Energy installations and technologies. 2022. T. 8. № 2. P. 79-86.</mixed-citation></ref><ref id="B9"><mixed-citation>Ryabushey Yu.N. Application of artificial neural networks in the field of information protection / Yu.N.&amp;nbsp;Ryabushey, A.V. Lebedenko, Yu.Yu. Goncharenko // In the collection: Modern problems of radio electronics and telecommunications &amp;quot;RT-2017.&amp;quot; 2017. P. 284.</mixed-citation></ref><ref id="B10"><mixed-citation>Zhukov A.O. Information security for the Smart City project / A.O. Zhukov, I.N. Kartsan, V.S.&amp;nbsp;Averyanov // Information and telecommunication technologies. 2021. № 51. P. 39-45.</mixed-citation></ref><ref id="B11"><mixed-citation>Seredkin S.P. Security of critical information infrastructure (a brief overview of modern approaches) // Information technologies and mathematical modeling in the management of complex systems. 2021. № 4 (12). P. 30-38.</mixed-citation></ref><ref id="B12"><mixed-citation>Cloud Top Security Threats (tadviser.ru) [Electronic Resource]: - Access Mode: https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:% D0% 93% D0% BB% D0% B0% D0% B2% D0% BD% D1% 8B% D0% B5 _% D1% 83% D0% B3% D1% 80% D0% BE% D0% B7% D1% 8B _% D0% B1% D0% B5% D0% B7% D0% BE% D0% BF% D0% B0% D1% 81% D0% BD% D0% BE% D1% 81% D1% 82% D0% B8 _% D0% B2 _% D0% BE% D0% B1% D0% BB% D0% B0% D0% BA% D0% B5.</mixed-citation></ref></ref-list></back></article>