云服务的威胁模型

IF 0.2 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI:10.30837/rt.2023.1.212.04
M.V. Yesina, V.V. Onoprienko, A.V. Tolok
{"title":"云服务的威胁模型","authors":"M.V. Yesina, V.V. Onoprienko, A.V. Tolok","doi":"10.30837/rt.2023.1.212.04","DOIUrl":null,"url":null,"abstract":"Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Models of threats to cloud services\",\"authors\":\"M.V. Yesina, V.V. Onoprienko, A.V. Tolok\",\"doi\":\"10.30837/rt.2023.1.212.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.\",\"PeriodicalId\":41675,\"journal\":{\"name\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2023-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30837/rt.2023.1.212.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2023.1.212.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

云服务由于其优于传统计算的优势而变得流行起来。云提供对软件、硬件和其他服务的远程访问。这使得公司的工作效率更高,并支持远程工作。云服务对硬件和基础设施的要求更少,从而降低了维护和支持信息技术的成本。组织未来的成功将主要取决于他们在运营中实现云计算的程度。根据预测,云IT技术的支出将继续增长,到2025年将超过传统IT技术的支出。随着越来越多的企业完成数字化转型,云服务的安全性成为一个关键问题。尽管有很多好处,云服务也面临着自身的安全威胁和挑战。由于云服务存储和处理大量敏感信息,因此云漏洞可能导致数据泄露,从而阻碍业务发展并对公司声誉造成重大损害。在出现技术问题和依赖外部提供商的情况下,存在与云服务不可用相关的风险。因此,企业在使用云服务时应仔细评估潜在威胁,并采取适当措施保护其数据和业务。有许多方法可以帮助确定您的组织对日益增长的威胁准备得如何。威胁建模是对可能发生的威胁进行预测和准备的方法之一。使用建模框架允许您在攻击期间分配资源并计划可能的操作。有许多可用的建模框架,但重要的是要记住,这些框架有其优点和缺点,因此选择取决于特定系统的上下文和需求。分析、评估和比较用于云服务中建模和防范威胁的现有方法是本文的主要目标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Models of threats to cloud services
Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
33.30%
发文量
0
期刊最新文献
Combined heat conductive boards with polyimide dielectrics Synthesis and analysis of the trace detector of air objects of an interrogating radar system Creating a call center test bench for load balancing Asterisk servers in a cluster Current state and development trends of class E oscillators: an overview Experimental studies of a lidar emitter built according to the oscillator-amplifier scheme
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1