CURRENT APPROACHES TO INCREASED PROTECTION AGAINST TROJAN HORSES IN CLOUD SERVER SOLUTIONS
: IT companies are presenting to their customers cloud computing as a technology that will give them a competitive advantage if they implement it faster than their competitors. It is true that cloud computing can improve the businesses capability to access, share, and protect their company's data, particularly when they have a limited capacity to manage on-site modern technology resources. Using cloud services or simply only thinking of moving data to the cloud creates a wide set of concerns, starting with basic security concerns, and going as far as to the availability of cloud services, that is the company would not be able to get to the data when it needs it. Small and medium companies do not have enough resources to fight cyberattacks, but they can implement policies that will minimize the risk of the loss of their valuable data. The aim of this paper is to describe the current threats companies are facing when they use cloud services and to give them advice how to minimize the risk of these threats. We will specify a set of rules especially for small and medium companies and organizations that should help them to be able to choose more secure cloud services for their particular needs.
Bajramovic E. & Gupta D. (2017). Providing security assurance in line with national DBT assumptions. AIP Conference Proceedings 1799, 050005 (2017); doi: 10.1063/1.4972939
Bohdalova M. & Kurdyova E. (2013). Dataminingova analyza na priklade jazykovej agentury. Forum Statisticum Slovacum, 9 (5), 3-9.
Byres E. (2016). Using Tofino™ to control the spread of Stuxnet Malware, MTL Network security, AN-Byres 119, rev 2,
Davidekova M., & Farkas P. (2014). On the Cross-Correlation Properties of Complete Complementary Codes of Different
Families (N, N, N2) and (N, N, N). In Proceedings of International Scientific Conference for Ph. D. students of EU countries,
Comparative European Research, LONDON. 2014, 117-120.
Davidekova, M. (2016) Digitalization of Society: Smartphone–a Threat. In: 8th International Research Conference
Management Challenges in the 21st Century: Digitalization of the Society, Economy and Market: Current Issues and
Challenges. 2016. 314-320.
Farwell J. P. & Rohozinski R. (2011). Stuxnet and the future of cyber war, Survival, 53(1), 23-40.
Fiaidhi, J. & Gelogo, Y. E. (2012) SCADA Cyber Attacks and Security Vulnerabilities: Review, ACN, Advanced Science and Technology Letters, SERSC 14(2012), 202-208.
Karovic V. (2013). Linux, Digital Science Magazine 2 (4) 10, http://digitalmag.sk/linux/
Karovic V., Drahosova M., Karovic V.ml. (2015). Information security. CER Comparative European research 2015: The fourth International Scientific Conference for PhD students of EU countries, vol. 2, London: Sciemcee publishing, 2015, 134-137, http://www.sciemcee.org/library/proceedings/cer/cer2015_proceedings02.pdf
Kenney M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis, 59(1), 111–128
Lifars (2017). The Importance of a Corporate Culture Built Around Security (2017). Retrieved April 27, 2017 from LIFARS
Redondo-Hernandez A., Couce-Vieira A. & Houmb S.H. (2015). Detection of Advanced Persistent Threats Using System and Attack Intelligence, Emerging 2015: The Seventh International Conference on Emerging Networks and Systems Intelligence, IARIA, 2015. 90-94.
Somani G, Singh M., Sanghi D., Buyya R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48, https://doi.org/10.1016/j.comcom.2017.03.010,Wenli S. (2015). Study on the Vulnerability Analysis Method for Industrial Embedded Devices. Automation Instrument, 36, (10), 63-67.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Creative Commons Attribution License 3.0 - CC BY 3.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
firstname.lastname@example.org, www.iseic.cz, ojs.journals.cz