SciELO - Scientific Electronic Library Online

 
vol.15 issue4  suppl.1Estimating latent knowledge in large volumes of data using the Bayesian Knowledge Tracing algorithmHigh-availability distributed architecture for fraud detection author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

  • Have no cited articlesCited by SciELO

Related links

  • Have no similar articlesSimilars in SciELO

Share


Revista Cubana de Ciencias Informáticas

On-line version ISSN 2227-1899

Abstract

VALERIEVICH TSAREGORODTSEV, Anatoliy  and  DMITRIEVICH VOLKOV, Sergey. Improving information exchange processes when implementing the State’s information function on the internal level. Rev cuba cienc informat [online]. 2021, vol.15, n.4, suppl.1, pp. 181-198.  Epub Dec 01, 2021. ISSN 2227-1899.

The information function is one of the key components of the State’s entire mechanism, the entire system of state bodies. Cloud computing is now becoming one of the most common IT technologies for deploying applications due to its key features: flexible solutions, on-demand availability and good price/quality ratio. Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of confidential data and justifies the need for the inclusion of private clouds with a high degree of protection in a hybrid cloud computing environment. Suggested approach to information security risk estimation allows conduction of cloud environment security functioning in conditions of considered vulnerability class influence and also an effectiveness of measure and facility complex to withstand these vulnerabilities. On the basis of received estimation an opportunity to choose between different variants of cloud computing environment configuration and choose more appropriate way according to security requirements arises.

Keywords : information sphere; information function; cloud computing; information security threats; information risk analysis; information security requirements.

        · abstract in Spanish     · text in English     · English ( pdf )