scholarly journals CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY

Author(s):  
І. Андрущак ◽  
В. Марценюк ◽  
I. Андрощук ◽  
В. Чудовець ◽  
М. Потейчук

The article discusses the current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. The standards, regulations and guidance documents in the field of cloud computing information security are developed and analyzed, developed by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA) and the National Institute of Standards and Technology (NIST), and the results of a detailed analysis of the issues information security in the cloud.

Author(s):  
Radoslav M. Raković

The concept of “Cloud computing” became very interesting in recent years because it enables optimization of resources used and costs paid for it. Considering all advantages, this approach is applied widely in business systems of general purpose. In recent years, in literature it is possible to find considerations related to application of this approach in corporate systems as electric power utilities. Having in mind that such types of systems represent infrastructure ones that have great impact to the security of people and utilities, a very important question related to information security should be seriously considered. This chapter discusses advantages and disadvantages of application of cloud computing in electric power utility systems.


Social Law ◽  
2019 ◽  
pp. 125-131
Author(s):  
S. Liskov

The article deals with the current state of administrative and legal regulation tax service entities in Ukraine. The aim is to analyze the advantages and disadvantages of such regulation. It gives a detailed analysis of legislation and practice of activity of tax service entities in Ukraine. The problems of administrative and legal regulation are investigated and the main way of their solution. The paper gives valuable information about changes in the Ukrainian legislation on the powers, social guarantees and legal responsibility of tax authorities. Discussed in the article issue can be used as a strategy to improve the administrative and legal regulation of the activities of such state bodies. The article is of great help to legislative and executive power for the development of legal acts.


2019 ◽  
Vol 7 (1) ◽  
pp. 30-33
Author(s):  
Simona Jaculjaková ◽  
◽  
Lukáš Trnka ◽  
Stanislava Turská ◽  
Iwona Rybicka

The article deals with the issue of Smart City concept in the capitals of the V4 countries. We have defined technical terms that are related to the issue. In the analysis of the current situation, we focused on individual areas in which the Smart City concept services are provided. Based on the analysis of the current state, we have concluded. The most frequently used applications in V4 capitals are those belonging to the three areas studied. These areas include transport, ecology and re-al-time services. We compared the individual applications provided to citizens in the capitals of the V4 countries. These applications are included in the three mentioned areas of the Smart City concept. Based on a detailed analysis, we defined the advantages and disadvantages of the three most used areas of the Smart City concept.


2020 ◽  
Vol 12 ◽  
pp. 3-9
Author(s):  
Yulia V. Gracheva ◽  
◽  
Aleksandr I. Korobeev ◽  
Sergey V. Malikov ◽  
Aleksandr I. Chuchaev ◽  
...  

The paper considers the current state and prospects of development of unmanned (highly automated) vehicles in Russia. Relying on the strategic direction that the vehicles functioning in unmanned mode should be gradually included into the already established transport system without exposing other road participants to danger and ensuring the observance of traffic rules, the article gives a detailed analysis of vulnerabilities and risks that have to be faced in the development and operation of highly automated vehicles. The global practice shows that not only technical and organizational means, but also legal measures play a major role in ensuring the safety of unmanned vehicles. The authors propose to develop legal measures aimed at preventing the harm caused by unmanned vehicles to be implemented within the framework of Chapter 27 of the RF Criminal Code “Crimes against traffic safety and vehicle operation”.


2018 ◽  
pp. 131-141 ◽  
Author(s):  
A. N. Savrukov ◽  
N. T. Savrukov ◽  
E. A. Kozlovskaya

The article analyzes the current state and level of development of publicprivate partnership (PPP) projects in the subjects of the Russian Federation. The authors conclude that a significant proportion of projects is implemented on a concession basis at the municipal level in the communal sphere. A detailed analysis of the project data showed that the structure of the projects is deformed in favor of the central regions of the Russian Federation, and a significant share in the total amount of financing falls on the transport sector. At the stage of assessing the level of development by the subjects of the Russian Federation, criteria were proposed, and index and integral indicators were used, which ensured comparability of the estimates obtained. At the end of the analysis, the regions were ranked and clustered according to the level of PPP development, which allowed to reveal the number and structure of leaders and outsiders.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2010 ◽  
Vol 10 (1) ◽  
pp. 88-104 ◽  
Author(s):  
Howard O. Rockness ◽  
Joanne W. Rockness

ABSTRACT: This paper evaluates the current state of ethics CPE requirements for the CPA profession in the context of the ethics literature in philosophy, business, and accounting and documents the development of state-level ethics requirements for CPAs. It presents a detailed analysis of ethics CPE requirements by state including hours required, frequency required, acceptance of ethics CPE across state lines, and course content. The paper then proposes changes in the content of CPE-required ethics courses consistent with the ethics education literature and to reduce the complexity of meeting multiple state requirements. The recommendations would improve the overall effectiveness of ethics CPE for CPAs.


Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


Sign in / Sign up

Export Citation Format

Share Document