STUDY OF METHODS OF PROTECTING THE INFORMATION RESOURCES OF THE ENTERPRISE USING CLOUD TECHNOLOGIES

Authors

  • Oksana Zhyharevych Lesya Ukrainka Volyn National University
  • Valentyna Skalova National Aviation University
  • Dmytro Tsiupiashchuk Lesya Ukrainka Volyn National University

Abstract

This paper examines the methods of protecting the company's information resources when using cloud technologies. The purpose of the study is to analyze the effectiveness of existing protection methods and develop recommendations for increasing the level of information security. The work examines modern threats and risks associated with the use of cloud environments, such as unauthorized access, data leakage, malicious attacks and software vulnerabilities

References

CLOUD VS. ON-PREMISES COSTS [Електронний ресурс] – 5 с. – Режим доступу : https://codilime.com/pdf/faCloudOnPremisesFoundations.pdf

Control Engineering | Five characteristics of cloud computing [Електронний ресурс] – Режим доступу : https://www.controleng.com/articles/fivecharacteristics-of-cloud-computing/

Published

2024-06-09