Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ European Scientific ...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
European Scientific e-Journal
Article . 2022 . Peer-reviewed
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2022
License: CC BY
Data sources: ZENODO
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Monitoring of cyber incidents of cloud services and protection of digital communication channels

Authors: Hrebeniuk, Andrii М.; Rybalchenko, Lyudmila V.; Prokopov, Serhii О.;

Monitoring of cyber incidents of cloud services and protection of digital communication channels

Abstract

This article is dedicated to cloud services and modern possibilities of protection of digital communication channels. Today, usage of cloud technologies is steadily increasing both in business and in everyday life. Saving and processing of large amounts of information in a virtual environment is accomplished through the hardware and software, as well as communication channels of the provider. Fast access and reliable protection of personal data is an important part of the basic requirements of work with modern smart technologies. The purpose of the research is the analysis and monitoring of security in the cloud services. In the course of the research to achieve the set goal were used the following methods: methods of comparison, statistical and graphical analysis. In the article were used the previous scientific research works of various authors, as well as the periodic ranking surveys of popular world economic agencies and forums. The authors concluded that the most effective is the passwordless login technology, which supports authentication based on certificates, ensures secure storage and management of certificates, which are linked to the user and a specific device. Стаття присвячена хмарним сервісам та сучасним можливостям захисту цифрових каналів зв’язку. Застосування хмарних технології на сьогоднішній день постійно зростає як у бізнесі так і у повсякденному житті. Збереження та обробка великих обсягів інформації у віртуальному середовищі створюється із застосуванням апаратних засобів, програмного забезпечення та каналів зв’язку провайдера. Швидкий доступ та надійний захист персональних даних є важливою складовою щодо основних вимог роботи із сучасними хмарними технологіями. Метою дослідження є аналіз та моніторинг забезпечення безпеки у хмарних сервісах. У ході дослідження для досягнення поставленої мети застосовувались методи порівняння, статистичного та графічного аналізу. У дослідженні застосовано попередні наукові праці авторів, періодичні рейтингові дослідження популярних світових економічних агенцій та форумів. Автори дійшли висновку, що технологія безпарольного входу, яка підтримує автентифікацію на основі сертифікатів, забезпечує безпечне зберігання та керування сертифікатами, які прив’язані до користувача та конкретного пристрою, є найбільш ефективною.

Keywords

fraudulent records, hybrid cloud monitoring, захист персональних даних, шахрайські записи, кібершахрайство, personal data protection, гібридний хмарний моніторинг, , ,, confidential information, конфіденційна інформація, хмарні технології, cloud technology, cyber fraud

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 4
    download downloads 6
  • 4
    views
    6
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
0
Average
Average
Average
4
6
Green
gold