|
AUTHENTICATION PROCESS THREATS IN THE CLOUD TECHNOLOGIES
|
|
|
M. Karpinski;O. Oksiiuk;V. Chaikovska;O. Veselska;L. Wieclaw
|
|
|
||
|
|
|
|
1314-2704
|
|
|
||
|
English
|
|
|
19
|
|
|
2.1
|
|
|
|
|
|
||
|
The most challenging question is protection the authentication process in the cybersecurity. Since a lot of companies decide to store their data in the cloud services, it is crucial to secure the authentication process here. The authentication is the most vulnerable process because of its simple identifying weaknesses. It is used by all attackers that make their attacks destroying and more accurate. The hackers use it for the identity thefts or other cybercrimes. First, I need to research all current threats to this process. Second, I need to analyze all vulnerabilities and find the best feasible way to protect weak sides. The research like performed one is required for knowing the threats that can lead to irreversible consequences as identity thefts, data misuse, a compromise and so on. This is especially crucial for military and government industries. In this article, it is represented the main threats to the authentication process in the cloud services. We can see the tendency of regulation the authentication process in the banking, but not the cloud services. That is why it is needed to implement the best solutions to protect user's theft while the authentication process into the clouds.
|
|
|
conference
|
|
|
||
|
||
|
19th International Multidisciplinary Scientific GeoConference SGEM 2019
|
|
|
19th International Multidisciplinary Scientific GeoConference SGEM 2019, 30 June - 6 July, 2019
|
|
|
Proceedings Paper
|
|
|
STEF92 Technology
|
|
|
International Multidisciplinary Scientific GeoConference-SGEM
|
|
|
Bulgarian Acad Sci; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci & Arts; Slovak Acad Sci; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; World Acad Sci; European Acad Sci, Arts & Letters; Ac
|
|
|
131-136
|
|
|
30 June - 6 July, 2019
|
|
|
website
|
|
|
cdrom
|
|
|
5339
|
|
|
information security; cloud technology; threat
|
|