Peer-reviewed articles 17,970 +



Title: AUTHENTICATION PROCESS THREATS IN THE CLOUD TECHNOLOGIES

AUTHENTICATION PROCESS THREATS IN THE CLOUD TECHNOLOGIES
M. Karpinski;O. Oksiiuk;V. Chaikovska;O. Veselska;L. Wieclaw
1314-2704
English
19
2.1
The most challenging question is protection the authentication process in the cybersecurity. Since a lot of companies decide to store their data in the cloud services, it is crucial to secure the authentication process here. The authentication is the most vulnerable process because of its simple identifying weaknesses. It is used by all attackers that make their attacks destroying and more accurate. The hackers use it for the identity thefts or other cybercrimes. First, I need to research all current threats to this process. Second, I need to analyze all vulnerabilities and find the best feasible way to protect weak sides. The research like performed one is required for knowing the threats that can lead to irreversible consequences as identity thefts, data misuse, a compromise and so on. This is especially crucial for military and government industries. In this article, it is represented the main threats to the authentication process in the cloud services. We can see the tendency of regulation the authentication process in the banking, but not the cloud services. That is why it is needed to implement the best solutions to protect user's theft while the authentication process into the clouds.
conference
19th International Multidisciplinary Scientific GeoConference SGEM 2019
19th International Multidisciplinary Scientific GeoConference SGEM 2019, 30 June - 6 July, 2019
Proceedings Paper
STEF92 Technology
International Multidisciplinary Scientific GeoConference-SGEM
Bulgarian Acad Sci; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci & Arts; Slovak Acad Sci; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; World Acad Sci; European Acad Sci, Arts & Letters; Ac
131-136
30 June - 6 July, 2019
website
cdrom
5339
information security; cloud technology; threat