SECURITY THREATS IN CLOUD SYSTEMS AND WAYS OF THEIR DESTRUCTION
Keywords:
cyberattack, IT-infrastructure, data compromise, cloud systemsAbstract
The article deals with the problem of data security threats that is managed by applications and services running on cloud systems, as well as data that is directly stored in cloud storage repositories. In the scope of this article the main types of threats and recommendations for their minimization are described.
Key words: cloud systems, data compromise, IT-infrastructure, cyberattack.
Bibl.: 3.
References
Wei J. Cloud Security Alliance. Security as a Service [Електронний ресурс] / електрон. наук. вид. Security Guidance for Critical Areas of Focus in Cloud. – 2015. – № 4. – С.102–144. – Режим доступу до журн. : https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf.
Ali M. Security in cloud computing: Opportunities and challenges [Електронний ресурс] : електронне видання Elsevier / Khan S. U., Vasilakos A. V. // An International Journal. – 2017. – № 305. – С. 359–373. – Режим доступу до журн. : https://pdfs.semanticscholar.org/40e7/adc40b609cd13f9b84a5cc9ae780ffba6ec0.pdf.
Zissis D. Addressing cloud computing security issues [Електронний ресурс] / Lekkas D. // Future Generation Computer Systems. – 2012. – № 28. – С.15–43. – Режим доступу до журн. : https://doi.org/10.1016/j.future.2010.12.006.