Analysis of the methods and technologies of information security in cloud server
Автор: Troshina S.M., Lukyanenko S.D.
Журнал: Виктимология @victimologiy
Рубрика: Предупреждение преступности
Статья в выпуске: 4 (10), 2016 года.
Бесплатный доступ
Low level of information protection when using the cloud server creates the threat of incidents. Terrorist and extremist organizations use the information vulnerability of cloud servers to create a risk of technogenic catastrophes. Species analysis of the characteristics of cloud technologies and existing remedies allowed to make suggestions for strengthening information security in this field.
Cloud computing, server, encryption, filtering, authorization, identification, authentication, unauthorized access, transnational crime, organized crime, man-made disasters, information security
Короткий адрес: https://sciup.org/14118603
IDR: 14118603