Automation of organizations using cloud technologies: security issues

Keywords: cloud technologies, security, virus, information.

Abstract

The article reveals the principles of automation of organizations using cloud technologies through the prism without the peak aspect. The main stages of development of cloud technologies are characterized, the advantages of using these systems in everyday work are revealed (low consumption of financial resources, possibility of universal access to information, constant improvement of software and technologies). At the same time, attention is drawn to the main challenges facing users of cloud services: the need for a constant and uninterrupted Internet, the inability to recover information in case of loss. Security remains a major issue, therefore. The purpose of the article is to analyze the risks and possible ways to overcome them in the work of organizations with cloud technologies. It is established that the system that affects the reliable storage of information from customers can be exposed to such threats as cross-site-scripting, fishing, Trojans, viruses. This is due to the fact that, as a rule, consumers working with the cloud computing service, use an Internet browser. In order to optimize information security at this level, you need to use licensed anti-virus software packages, personal firewall tools, tools to encrypt data or information on disk, a properly configured Internet browser. It is proved that the security of virtualization mechanisms also affects the reliability of the virtual environment. For example, if the attack is organized on the monitor of virtual machines, the attacker may unnoticed by the security system, which are in the virtual machines can edit, copy or block the flow of information. Thus, if a hacker gains access to control capabilities, he will not only be able to edit data, but also steal it throughout the virtual network. Therefore, to avoid this situation, you need to protect the administration or servers of virtual machines. In addition, you need to create specialized information security tools that can monitor traffic inside the required server. At the same time, compliance with basic fire safety rules is also important for the safe operation of servers.

References

Kulyk, V. A. & Liubymov, M.O. (2019). Opportunities, threats, and prospects for using cloud technologies in accounting. Naukovyj visnyk PUET, 2 (93), 40-46.

Litoshenko, A.V. (2017). Cloud computing as a kind of outsourcing of Computer Services and its advantages. Ekonomika ta derzhava, 6, 86-89.

Liubymov, M. O. & Kulyk, V.A. (2019). Opportunities, threats, and prospects for using cloud technologies in accounting. Naukovyj visnyk Poltavs'koho universytetu ekonomiky i torhivli, 2(93), 40-46.

Mazina, O.I., Olijnyk, V.S. & Rohoznyj, S.A. (2020), Digitalization as the most important tool for the development of the accounting and reporting system. Internauka. Seriia: Ekonomichni nauky, 5(37), 59-66.

Attaran, M., & Woods, J. (2018). Cloud computing technology: Improving small business performance using the internet. Journal of Small Business & Entrepreneurship, 31(6), 495-519. https://doi.org/10. 1080/08276331.2018.1466850

Cresswell, K., Domínguez Hernández, A., Williams, R., & Sheikh, A. (2022). Key challenges and opportunities for cloud technology in health care: Semistructured interview study. JMIR Human Factors, 9(1), e31246. https://doi.org/10.2196/31246

Gleeson, N., & Walden, I. (2021). Cloud computing, standards, and the law. Cloud Computing Law, 501-524. https://doi.org/10.1093/oso/9780198716662. 003.0015

Palos-Sanchez, P. R., Arenas-Marquez, F. J., & Aguayo-Camacho, M. (2017). Cloud computing (SaaS) adoption as a strategic technology: Results of an empirical study. Mobile Information Systems, 2017, 1-20. https://doi.org/10.1155/2017/2536040

Scale, M. E. (2009). Cloud computing and collaboration. Library Hi Tech News, 26(9), 10-13. https://doi.org/10. 1108/07419050911010741

Xue, C. T., & Xin, F. T. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15. https://doi.org/10.5121/ijccsa.2016.6601


Abstract views: 212
PDF Downloads: 158
Published
2022-07-01
How to Cite
Zalialetdzinau, K. (2022). Automation of organizations using cloud technologies: security issues. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (47), 21-25. https://doi.org/10.36910/6775-2524-0560-2022-47-04