<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[Rev cuba cienc informat]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992021000500181</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Improving information exchange processes when implementing the State&#8217;s information function on the internal level]]></article-title>
<article-title xml:lang="es"><![CDATA[Mejorar los procesos de intercambio de información al implementar la función de información del Estado a nivel interno]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valerievich Tsaregorodtsev]]></surname>
<given-names><![CDATA[Anatoliy]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Dmitrievich Volkov]]></surname>
<given-names><![CDATA[Sergey]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Moscow State Linguistic University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Russia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<volume>15</volume>
<numero>4</numero>
<fpage>181</fpage>
<lpage>198</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992021000500181&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992021000500181&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992021000500181&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The information function is one of the key components of the State&#8217;s entire mechanism, the entire system of state bodies. Cloud computing is now becoming one of the most common IT technologies for deploying applications due to its key features: flexible solutions, on-demand availability and good price/quality ratio. Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of confidential data and justifies the need for the inclusion of private clouds with a high degree of protection in a hybrid cloud computing environment. Suggested approach to information security risk estimation allows conduction of cloud environment security functioning in conditions of considered vulnerability class influence and also an effectiveness of measure and facility complex to withstand these vulnerabilities. On the basis of received estimation an opportunity to choose between different variants of cloud computing environment configuration and choose more appropriate way according to security requirements arises.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN La función de información es uno de los componentes clave de todo el mecanismo del Estado, todo el sistema de órganos estatales. La computación en la nube se está convirtiendo en una de las tecnologías de TI más comunes para implementar aplicaciones debido a sus características clave: soluciones flexibles, disponibilidad bajo demanda y buena relación precio / calidad. Debido a que la computación en la nube trae consigo nuevos desafíos en el campo de la seguridad de la información, es imperativo que las organizaciones controlen el proceso de gestión de riesgos de la información en la nube. Este documento propone un enfoque de evaluación de riesgos para evaluar el daño potencial del ataque a la implementación de componentes de datos confidenciales y justifica la necesidad de incluir nubes privadas con un alto grado de protección en un entorno de computación en nube híbrida. El enfoque sugerido para la estimación de riesgos de seguridad de la información permite la conducción del funcionamiento de la seguridad del entorno de nube en condiciones de influencia de clase de vulnerabilidad considerada y también una eficacia de medida y complejo de instalaciones para resistir estas vulnerabilidades. Sobre la base de la estimación recibida, surge la oportunidad de elegir entre diferentes variantes de configuración del entorno de computación en la nube y elegir la forma más adecuada de acuerdo con los requisitos de seguridad.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[esfera de información]]></kwd>
<kwd lng="es"><![CDATA[función de información]]></kwd>
<kwd lng="es"><![CDATA[computación en la nube]]></kwd>
<kwd lng="es"><![CDATA[amenazas a la seguridad de la información]]></kwd>
<kwd lng="es"><![CDATA[análisis de riesgo de información]]></kwd>
<kwd lng="es"><![CDATA[requisitos de seguridad de la información]]></kwd>
<kwd lng="en"><![CDATA[information sphere]]></kwd>
<kwd lng="en"><![CDATA[information function]]></kwd>
<kwd lng="en"><![CDATA[cloud computing]]></kwd>
<kwd lng="en"><![CDATA[information security threats]]></kwd>
<kwd lng="en"><![CDATA[information risk analysis]]></kwd>
<kwd lng="en"><![CDATA[information security requirements]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Werner]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<source><![CDATA[Clouds, the virtual infrastructure and information security]]></source>
<year>2012</year>
<publisher-name><![CDATA[Elvis-Plus Publish]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kachko]]></surname>
<given-names><![CDATA[A.K]]></given-names>
</name>
<name>
<surname><![CDATA[Lavrynenko]]></surname>
<given-names><![CDATA[M.M]]></given-names>
</name>
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A.V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[the approach of secure hybrid cloud construction]]></article-title>
<source><![CDATA[safety of information technology]]></source>
<year>2014</year>
<numero>1</numero>
<issue>1</issue>
<page-range>22-7</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Radin]]></surname>
<given-names><![CDATA[P.K]]></given-names>
</name>
<name>
<surname><![CDATA[Zubarev]]></surname>
<given-names><![CDATA[I.V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The main threats to the security of information in virtual environments and cloud platforms]]></article-title>
<source><![CDATA[Cybersecurity]]></source>
<year>2014</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sidorova]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Conflicting Cloud]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berdnik]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Threats to Cloud Computing and methods of their protection]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Winkler]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Cloud computing: security issues in virtual clouds]]></source>
<year>2021</year>
<publisher-name><![CDATA[house Elsevier]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A.V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security risk analysis of data in corporate networks-bank financial institutions on the basis of cloud computing.]]></article-title>
<source><![CDATA[National interests: priorities and safety]]></source>
<year>2013</year>
<volume>228</volume>
<numero>39</numero>
<issue>39</issue>
<page-range>35-44</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A.V]]></given-names>
</name>
<name>
<surname><![CDATA[Kachko]]></surname>
<given-names><![CDATA[A.K]]></given-names>
</name>
</person-group>
<source><![CDATA[Ensuring information security in cloud architecture of organization]]></source>
<year>2011</year>
<numero>5</numero>
<issue>5</issue>
<page-range>25-34</page-range><publisher-name><![CDATA[National Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A.V]]></given-names>
</name>
<name>
<surname><![CDATA[Kachko]]></surname>
<given-names><![CDATA[A.K]]></given-names>
</name>
</person-group>
<source><![CDATA[One of the approaches to the management of information security in the development of information infrastructure]]></source>
<year>2012</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>46-59</page-range><publisher-name><![CDATA[National Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Accorsi]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Wonnemann]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditing Workflow Execution against Dataflow Policies]]></source>
<year>2010</year>
<page-range>207-17</page-range><publisher-name><![CDATA[Proc. BIS]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mell]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Grance T]]></surname>
<given-names><![CDATA[Tim]]></given-names>
</name>
</person-group>
<source><![CDATA[The NIST Definition of Cloud Computing, Version 15]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<collab>NVD Common</collab>
<source><![CDATA[Vulnerability Scoring System Support v.2]]></source>
<year>2021</year>
<publisher-name><![CDATA[National Institute Of Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Trope]]></surname>
<given-names><![CDATA[R.L]]></given-names>
</name>
<name>
<surname><![CDATA[Power]]></surname>
<given-names><![CDATA[E.M]]></given-names>
</name>
<name>
<surname><![CDATA[Polley]]></surname>
<given-names><![CDATA[V.I]]></given-names>
</name>
<name>
<surname><![CDATA[Morley]]></surname>
<given-names><![CDATA[B.C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Coherent Strategy for Data Security through Data Governance.]]></article-title>
<source><![CDATA[IEEE Security &amp; Privacy]]></source>
<year>2007</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>32-9</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Zelenina]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Ruzicky]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Methodology of vulnerability assessment for various types of cloud structures]]></article-title>
<source><![CDATA[Information Technology Applications]]></source>
<year>2017</year>
<numero>1</numero>
<issue>1</issue>
<page-range>51-9</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A.V]]></given-names>
</name>
<name>
<surname><![CDATA[Zelenina]]></surname>
<given-names><![CDATA[A.N]]></given-names>
</name>
<name>
<surname><![CDATA[Saveliev]]></surname>
<given-names><![CDATA[V.A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Classification of vulnerabilities of cloud environments in the problem of quantitative risk assessment.]]></article-title>
<source><![CDATA[Modeling, optimization and information technology]]></source>
<year>2017</year>
<volume>19</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsaregorodtsev]]></surname>
<given-names><![CDATA[A.V]]></given-names>
</name>
</person-group>
<source><![CDATA[Two-stage procedure for quantitative assessment of information security risk of cloud computing.]]></source>
<year>2017</year>
<numero>4</numero>
<issue>4</issue>
<publisher-name><![CDATA[Modeling, optimization and information technology]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
