Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cloud security
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Many techniques and algorithms are developed to enhance the security in the cloud environment. This helps the users to secure their server from malicious attacks. Hence the study and investigation of the performance enhanced security algorithms is a must demanded field in the research industry. When large number users using same server to store their information in cloud environment security is a must needed component to preserve the privacy and confidentiality of every individual user. This can be further strengthened by detecting the attacks in earlier stages and taking countermeasure to prevent the attack. Thus securing the data network without any leakage and loss of the information is a challenging task in the cloud environment. When the attacks or intrusion is detected after the occurrence there may be damage to the data in the form of data damage or theft. Hence it is necessary to predict and detect the attacks before the occurrence to protect the privacy and confidentiality of the user information.
EN
The biggest software development companies conduct daily more than hundreds deployments which influence currently operating IT (Information Technology) systems. This is possible due to the availability of automatic mechanisms which are providing their functional testing and later applications deployment. Unfortunately, nowadays, there are no tools or even a set of good practices related to the problem on how to include IT security issues into the whole production and deployment processes. This paper describes how to deal with this problem in the large mobile telecommunication operator environment.
3
Content available Czy nasze dane w chmurze są bezpieczne?
PL
Błyskawiczny rozwój technologii oprogramowania oraz zwiększenie wydajności urządzeń przyczynia się do tworzenia nowoczesnych rozwiązań problemów, z którymi borykają się korporacje, firmy jak i zwykli użytkownicy chmury. Obecnie większość przedsiębiorstw nie wyobraża sobie pracy bez wykorzystania chmury do przechowywania swoich danych. Jednak jednym z największych problemów wykorzystania chmury to jej bezpieczeństwo. W artykule przedstawiono modele usług wraz z modelem rozmieszczenia chmur oraz rodzaje ataków.
EN
Rapid development in software technology and increase in efficiency of devices lead to finding new solutions for problems that corporations, companies, as well as common users of the cloud faced for years. Currently, most companies cannot imagine working without the cloud, where their data can be stored. One of the biggest issues concerning the cloud is the safety of its usage. The article shows various service and deployment models along with types of attacks.
EN
In the paper analysis of available, free Cloud Storage services for company/enterprise applications is presented. The choice of the most appropriate cloud service will be associated with such features as its compatibility in relation to the terms of use, data security, performance and stability. Performed analysis focuses on solutions which the license does not prohibit the use of their free version of the service for commercial purposes, in the company. An important factor, partly influencing for the choice, will also be intuitiveness, additional functionality and ease of use offered by client applications.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.