The article reveals the principles of automation of organizations using cloud technologies through the prism without the peak aspect. The main stages of development of cloud technologies are characterized, the advantages of using these systems in everyday work are revealed (low consumption of financial resources, possibility of universal access to information, constant improvement of software and technologies). At the same time, attention is drawn to the main challenges facing users of cloud services: the need for a constant and uninterrupted Internet, the inability to recover information in case of loss. Security remains a major issue, therefore. The purpose of the article is to analyze the risks and possible ways to overcome them in the work of organizations with cloud technologies. It is established that the system that affects the reliable storage of information from customers can be exposed to such threats as cross-site-scripting, fishing, Trojans, viruses. This is due to the fact that, as a rule, consumers working with the cloud computing service, use an Internet browser. In order to optimize information security at this level, you need to use licensed anti-virus software packages, personal firewall tools, tools to encrypt data or information on disk, a properly configured Internet browser. It is proved that the security of virtualization mechanisms also affects the reliability of the virtual environment. For example, if the attack is organized on the monitor of virtual machines, the attacker may unnoticed by the security system, which are in the virtual machines can edit, copy or block the flow of information. Thus, if a hacker gains access to control capabilities, he will not only be able to edit data, but also steal it throughout the virtual network. Therefore, to avoid this situation, you need to protect the administration or servers of virtual machines. In addition, you need to create specialized information security tools that can monitor traffic inside the required server. At the same time, compliance with basic fire safety rules is also important for the safe operation of servers.
Read full abstract