10 Information security management in the cloud computing environment

2021 ◽  
pp. 197-214
Author(s):  
Sungjin Yoo ◽  
He Li
2018 ◽  
Vol 24 (1) ◽  
pp. 739-743 ◽  
Author(s):  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Sundresan Perumal ◽  
...  

2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2014 ◽  
Vol 536-537 ◽  
pp. 616-619 ◽  
Author(s):  
Bang Fan Liu ◽  
Hui Hui Zhong ◽  
Meng Wang

Information security is a core issue to ensure the smooth implementation of e-government. On the one hand, cloud computing promote information security management from centralized to decentralized. Help to improve the ability of the information security of e-government. On the other hand, it can not be ignored that the unprecedented openness and complexity of cloud computing also threat to information security of e-government. In this paper, we shall discuss the building of the cloud computing information security of e-government from three aspects of technical, management and law.


2021 ◽  
Vol 31 (1) ◽  
Author(s):  
Paweł Kobis

This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was attracted to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.


Sign in / Sign up

Export Citation Format

Share Document