Analysis of the methods and technologies of information security in cloud server

Автор: Troshina S.M., Lukyanenko S.D.

Журнал: Виктимология @victimologiy

Рубрика: Предупреждение преступности

Статья в выпуске: 4 (10), 2016 года.

Бесплатный доступ

Low level of information protection when using the cloud server creates the threat of incidents. Terrorist and extremist organizations use the information vulnerability of cloud servers to create a risk of technogenic catastrophes. Species analysis of the characteristics of cloud technologies and existing remedies allowed to make suggestions for strengthening information security in this field.

Cloud computing, server, encryption, filtering, authorization, identification, authentication, unauthorized access, transnational crime, organized crime, man-made disasters, information security

Короткий адрес: https://sciup.org/14118603

IDR: 14118603

Статья научная