{"title":"保护云基础设施免受网络攻击","authors":"D. V. Yanovsʹkyy","doi":"10.31673/2409-7292.2022.025259","DOIUrl":null,"url":null,"abstract":"The article analyzes modern cloud systems. The problems, conflicts and possible limitations of cloud software and cloud services are studied. Recommendations for ensuring protection have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protection of cloud infrastructure from cyber attacks\",\"authors\":\"D. V. Yanovsʹkyy\",\"doi\":\"10.31673/2409-7292.2022.025259\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article analyzes modern cloud systems. The problems, conflicts and possible limitations of cloud software and cloud services are studied. Recommendations for ensuring protection have been developed.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.025259\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.025259","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protection of cloud infrastructure from cyber attacks
The article analyzes modern cloud systems. The problems, conflicts and possible limitations of cloud software and cloud services are studied. Recommendations for ensuring protection have been developed.