Digital Library NAES of Ukraine

Features of information security when using cloud services

- Сухіх, А.С. (orcid.org/0000-0001-8186-1715) (2023) Features of information security when using cloud services In: . ІЦО НАПН України, м. Київ, Україна, pp. 151-153. ISBN 978-617-8330-16-3

[thumbnail of Особливості інформ. безпеки.pdf] Text
Особливості інформ. безпеки.pdf

Download (361kB)

Abstract

The processes of digital transformation are taking place in various spheres of social activity, making the use of cloud environments increasingly popular each year. In some industries, cloud technologies are becoming essential for the full functioning of systems. Using the example of cloud technologies in the Google environment, the main components and services provided by cloud systems can be explored. This article examines the features of information security when using cloud services, analyzing risks and proposing data protection methods.

Item Type: Book Section
Keywords: cloud environment, information security
Subjects: Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.01/.08 Спеціальні визначники для позначення процесів оброблення даних із застосуванням комп'ютера > 004.08 Input, output and storage media
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.4 Software > 004.49 Computer infections
Divisions: Institute for Digitalisation of Education > Department of the Cloud-Вased Systems of ICT in Education
Depositing User: Аліса Сухіх
Date Deposited: 19 Jun 2024 11:59
Last Modified: 19 Jun 2024 11:59
URI: https://lib.iitta.gov.ua/id/eprint/741513

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item