SciELO - Scientific Electronic Library Online

 
vol.15 número4  suppl.1Estimar conocimiento latente en grandes volúmenes de datos utilizando el algoritmo Bayesian Knowledge TracingArquitectura distribuida de alta disponibilidad para la detección de fraude índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Artigo

Indicadores

  • Não possue artigos citadosCitado por SciELO

Links relacionados

  • Não possue artigos similaresSimilares em SciELO

Compartilhar


Revista Cubana de Ciencias Informáticas

versão On-line ISSN 2227-1899

Resumo

VALERIEVICH TSAREGORODTSEV, Anatoliy  e  DMITRIEVICH VOLKOV, Sergey. Improving information exchange processes when implementing the State’s information function on the internal level. Rev cuba cienc informat [online]. 2021, vol.15, n.4, suppl.1, pp. 181-198.  Epub 01-Dez-2021. ISSN 2227-1899.

The information function is one of the key components of the State’s entire mechanism, the entire system of state bodies. Cloud computing is now becoming one of the most common IT technologies for deploying applications due to its key features: flexible solutions, on-demand availability and good price/quality ratio. Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of confidential data and justifies the need for the inclusion of private clouds with a high degree of protection in a hybrid cloud computing environment. Suggested approach to information security risk estimation allows conduction of cloud environment security functioning in conditions of considered vulnerability class influence and also an effectiveness of measure and facility complex to withstand these vulnerabilities. On the basis of received estimation an opportunity to choose between different variants of cloud computing environment configuration and choose more appropriate way according to security requirements arises.

Palavras-chave : information sphere; information function; cloud computing; information security threats; information risk analysis; information security requirements.

        · resumo em Espanhol     · texto em Inglês     · Inglês ( pdf )