SciELO - Scientific Electronic Library Online

 
vol.15 número4  suppl.1Estimar conocimiento latente en grandes volúmenes de datos utilizando el algoritmo Bayesian Knowledge TracingArquitectura distribuida de alta disponibilidad para la detección de fraude índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Articulo

Indicadores

  • No hay articulos citadosCitado por SciELO

Links relacionados

  • No hay articulos similaresSimilares en SciELO

Compartir


Revista Cubana de Ciencias Informáticas

versión On-line ISSN 2227-1899

Resumen

VALERIEVICH TSAREGORODTSEV, Anatoliy  y  DMITRIEVICH VOLKOV, Sergey. Improving information exchange processes when implementing the State’s information function on the internal level. Rev cuba cienc informat [online]. 2021, vol.15, n.4, suppl.1, pp. 181-198.  Epub 01-Dic-2021. ISSN 2227-1899.

The information function is one of the key components of the State’s entire mechanism, the entire system of state bodies. Cloud computing is now becoming one of the most common IT technologies for deploying applications due to its key features: flexible solutions, on-demand availability and good price/quality ratio. Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of confidential data and justifies the need for the inclusion of private clouds with a high degree of protection in a hybrid cloud computing environment. Suggested approach to information security risk estimation allows conduction of cloud environment security functioning in conditions of considered vulnerability class influence and also an effectiveness of measure and facility complex to withstand these vulnerabilities. On the basis of received estimation an opportunity to choose between different variants of cloud computing environment configuration and choose more appropriate way according to security requirements arises.

Palabras clave : information sphere; information function; cloud computing; information security threats; information risk analysis; information security requirements.

        · resumen en Español     · texto en Inglés     · Inglés ( pdf )