CURRENT APPROACHES TO INCREASED PROTECTION AGAINST TROJAN HORSES IN CLOUD SERVER SOLUTIONS

  • Peter Veselý Faculty of Management, Comenius University in Bratislava
  • Michal Greguš Faculty of Management, Comenius University in Bratislava
  • Eleonóra Beňová Faculty of Management, Comenius University in Bratislava
Keywords: cloud, security, Trojan horses, 0-day, hack

Abstract

: IT companies are presenting to their customers cloud computing as a technology that will give them a competitive advantage if they implement it faster than their competitors. It is true that cloud computing can improve the businesses capability to access, share, and protect their company's data, particularly when they have a limited capacity to manage on-site modern technology resources. Using cloud services or simply only thinking of moving data to the cloud creates a wide set of concerns, starting with basic security concerns, and going as far as to the availability of cloud services, that is the company would not be able to get to the data when it needs it. Small and medium companies do not have enough resources to fight cyberattacks, but they can implement policies that will minimize the risk of the loss of their valuable data. The aim of this paper is to describe the current threats companies are facing when they use cloud services and to give them advice how to minimize the risk of these threats. We will specify a set of rules especially for small and medium companies and organizations that should help them to be able to choose more secure cloud services for their particular needs.

References

Bajramovic E. & Gupta D. (2017). Providing security assurance in line with national DBT assumptions. AIP Conference Proceedings 1799, 050005 (2017); doi: 10.1063/1.4972939

Bohdalova M. & Kurdyova E. (2013). Dataminingova analyza na priklade jazykovej agentury. Forum Statisticum Slovacum, 9 (5), 3-9.

Byres E. (2016). Using Tofino™ to control the spread of Stuxnet Malware, MTL Network security, AN-Byres 119, rev 2,

Eaton 2016. https://www.mtl-inst.com/images/uploads/AN-BYRES119_Rev_2.pdf

Davidekova M., & Farkas P. (2014). On the Cross-Correlation Properties of Complete Complementary Codes of Different

Families (N, N, N2) and (N, N, N). In Proceedings of International Scientific Conference for Ph. D. students of EU countries,

Comparative European Research, LONDON. 2014, 117-120.

Davidekova, M. (2016) Digitalization of Society: Smartphone–a Threat. In: 8th International Research Conference

Management Challenges in the 21st Century: Digitalization of the Society, Economy and Market: Current Issues and

Challenges. 2016. 314-320.

Farwell J. P. & Rohozinski R. (2011). Stuxnet and the future of cyber war, Survival, 53(1), 23-40.

Fiaidhi, J. & Gelogo, Y. E. (2012) SCADA Cyber Attacks and Security Vulnerabilities: Review, ACN, Advanced Science and Technology Letters, SERSC 14(2012), 202-208.

Karovic V. (2013). Linux, Digital Science Magazine 2 (4) 10, http://digitalmag.sk/linux/

Karovic V., Drahosova M., Karovic V.ml. (2015). Information security. CER Comparative European research 2015: The fourth International Scientific Conference for PhD students of EU countries, vol. 2, London: Sciemcee publishing, 2015, 134-137, http://www.sciemcee.org/library/proceedings/cer/cer2015_proceedings02.pdf

Kenney M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis, 59(1), 111–128

Kumar M. (2017). Cyber Warfare: New Dimension in Security and Strategy. Available at SSRN: https://ssrn.com/abstract=2915653 or http://dx.doi.org/10.2139/ssrn.2915653

Lifars (2017). The Importance of a Corporate Culture Built Around Security (2017). Retrieved April 27, 2017 from LIFARS

LLC. https://lifars.com/2017/04/importance-corporate-culture-built-around-security/

Redondo-Hernandez A., Couce-Vieira A. & Houmb S.H. (2015). Detection of Advanced Persistent Threats Using System and Attack Intelligence, Emerging 2015: The Seventh International Conference on Emerging Networks and Systems Intelligence, IARIA, 2015. 90-94.

Somani G, Singh M., Sanghi D., Buyya R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48, https://doi.org/10.1016/j.comcom.2017.03.010,Wenli S. (2015). Study on the Vulnerability Analysis Method for Industrial Embedded Devices. Automation Instrument, 36, (10), 63-67.

Published
2017-09-24