【24h】

Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment

机译:网络安全:以云为中心的环境中的保护机制分析

获取原文
获取原文并翻译 | 示例

摘要

The numerous threats and data exfiltration that has taken place in our network require that significant effort is made to ensure the safety of organizational data and equipment. The diverse nature of emerging technologies and bring your own devices (BYOD), smartphones and so on makes it challenging to efficiently secure the traditional networks. However, the popularity resulting from low-cost service offerings in cloud computing and the dispersed nature, the use of virtual machines in cloud networks makes it attractive and perhaps safer than the regular networks. There is a certain level of the layer of abstraction with cloud computing, such as community cloud, distributed or hidden identity and the lack of control makes it appear impenetrable. The key to cybersecurity is for the protection of information in computer systems to protect and guide the architectural structures that are used to support the system or database. The protection of information in computer systems requires that protection mechanisms should guide the architectural structures that are used to support the system or database.
机译:我们网络中发生的众多威胁和数据外泄要求做出巨大的努力以确保组织数据和设备的安全。新兴技术的多样性和自带设备(BYOD),智能手机等使有效保护传统网络面临挑战。但是,由于云计算中的低成本服务产品和分散的性质而引起的普及,在云网络中使用虚拟机使其比常规网络更具吸引力,甚至比常规网络更安全。云计算的抽象层在一定程度上具有一定程度,例如社区云,分布式或隐藏的身份,缺乏控制使其显得不可穿透。网络安全的关键是保护计算机系统中的信息,以保护和指导用于支持系统或数据库的体系结构。对计算机系统中信息的保护要求保护机制应指导用于支持系统或数据库的体系结构。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号