BULUTLI TEXNOLOGIYALARDA XAVFLARNI BOSHQARISH
Keywords:
Bulutli provayderlar, Risklarni boshqarish, SDLC, RMFAbstract
Ushbu maqolada Bulutli xavfni boshqarish to‘g‘risida ma`lumotlar yoritib berilgan. Bulutli axborot tizimlari tahdidlarga duchor bo'ladigan tashkilot faoliyatiga salbiy ta'sir ko'rsatishi mumkin (ya'ni, missiyalar, funktsiyalar, imidj yoki obro'), tashkilot aktivlari, jismoniy shaxslar va boshqa tashkilotlar. Risklarni boshqarish davriy ravishda amalga oshirilishi kerak bo`lgani uchun muvofiqlashtirilgan tadbirlar majmuini o'z ichiga olgan jarayon xavflarni nazorat qilishga asoslangan.
References
Karimov, Abdukodir, et al. "Cloud Computing Security Challenges and Solutions." 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021.
Sun, PanJun. "Security and privacy protection in cloud computing: Discussions and challenges." Journal of Network and Computer Applications 160 (2020): 102642.
Tabrizchi, Hamed, and Marjan Kuchaki Rafsanjani. "A survey on security challenges in cloud computing: issues, threats, and solutions." The journal of supercomputing 76.12 (2020): 9493-9532.
Sasubilli, Manoj Kumar, and R. Venkateswarlu. "Cloud computing security challenges, threats and vulnerabilities." 2021 6th international conference on inventive computation technologies (ICICT). IEEE, 2021.
Shabbir, Maryam, Ayesha Shabbir, Celestine Iwendi, Abdul Rehman Javed, Muhammad Rizwan, Norbert Herencsar, and Jerry Chun-Wei Lin. "Enhancing security of health information using modular encryption standard in mobile cloud computing." IEEE Access 9 (2021): 8820-8834.