MAIN ASPECTS OF SAFE USE OF CLOUD TECHNOLOGIES IN A COVID-19 PANDEMIC

Authors

DOI:

https://doi.org/10.32851/tnv-tech.2021.4.3

Keywords:

remote work, cloud technologies, cybersecurity, COVID-19, technology corporations

Abstract

The article reveals the main problems of remote operation in the constraint mode associated with the COVID-19 pandemic using available cloud technologies. Identified, analyzed and systematized cybersecurity issues related to remote applications. Spreading around the world, the COVID-19 pandemic has affected global restrictions on public gatherings of all types, including the traditional workplace. Today millions of companies face the challenge of managing a completely remote workforce through remote work and related technologies. COVID-19 and the large-scale transition to teleworking have provided a digital breakthrough and a huge cultural shift in operational terms for every organization around the world. Many technology providers have already adjusted their respective information products and services to enable the global adoption of teleworking. Likewise, organizations across all sectors are implementing telecommuting policies for their employees in line with this trend. Likewise, organizations across all sectors are implementing telecommuting policies for their employees in line with this trend. Tech corporations Microsoft, Facebook, Amazon, Twitter, Google, and many others have updated guidelines for their employees to work remotely and balance productivity. At the same time, they focus on carefully tweaking potential connectivity disadvantages that previously existed in their products and services. Cybersecurity risks posed by weaknesses in remote technologies are not particularly new, but as social distancing policies due to the pandemic force employees to work more from home and as people seek new ways to stay connected, hackers around the world are also using new ones approaches to fraud and cyberattacks against workers and new professional activities on the Internet of many companies. Successful cyberattacks result in data loss, damage to reputation and technological apathy; potentially undermine efforts to contain the spread of COVID-19. The aim of the study is to address the challenges posed by teleworking, including cybersecurity risk factors, technological apathy, and the consequences of cyber attacks using available cloud technologies.

References

Worldwide Public Cloud Services Spending Will More Than Double by 2023. USA, Framingham, July 3, 2019. URL: https://www.idc.com/getdoc.jsp?containerId=prUS45340719 (дата звернення: 17.09.2021).

Кононюк А.Е. Фундаментальная теория облачных технологий: Общенаучные подходы формирования систем облачных технологий. Киев : Освіта України, 2018 Т. 1. 621 с.

Вольська К.О., Дикий А.П. Бухгалтерський облік у «хмарі»: порядок переходу та адаптації інформаційної системи підприємства. Проблеми теорії та методології бухгалтерського обліку, контролю і аналізу. ЖДТУ, № 2(37), с. 24–29, 2017. DOI: 10.26642/pbo-2017-2(37)-24-29.

Хмарні обчислення, Integrity Systems. URL: http://integritysys.com.ua/solutions/pricatecloud-solution. (дата звернення: 17.09.2021).

Кононюк А.Е. Фундаментальная теория облачных технологий: Введение в фундаментальную теорию облачных технологий. Киев : Освіта України, 2018 Т. 2. 528 с.

Облачные вычисления (Cloud computing). URL: http://www.tadviser.ru/index.php/Статья:Облачные_вычисления_%28Cloud_computing%29. (дата звернення: 17.09.2021).

Cloud computing. URL: https://en.wikipedia.org/wiki/Cloud_computing#Service_models (дата звернення: 17.09.2021).

The NIST Definition of Cloud Computing. URL: https://csrc.nist.gov/publications/detail/sp/800-145/final (дата звернення: 17.09.2021).

Fernando Doglio. “Content as a Service: Your Guide to the What, Why, and How” ButterCMS, May 7, 2019. URL: https://buttercms.com/blog/content-as-a-service-yourguide-to-the-what-whyand-how (дата звернення: 17.09.2021).

Olson John A. Data as a Service: Are We in the Clouds?. Journal of Map & Geography Libraries. 6 (1): 76–78. DOI: 10.1080/15420350903432739.

Desktop virtualization. URL: https://en.wikipedia.org/wiki/Desktop_virtualization #Desktop_as_a_service (дата звернення: 17.09.2021).

Mike Roberts. “Serverless Architectures”, May 22, 2018. URL: https://martinfowler.com/articles/serverless.html#unpacking-faas (дата звернення: 17.09.2021).

Antony Ananich. “What is IaaS?”, Mar. 2, 2016. URL: https://web.archive.org/web/20160302153830/http://ananich.pro/2016/02/what-is-iaas/ (дата звернення: 17.09.2021).

Donovan Jones. “Blackstone Acquires Cloudreach For Access To iPaaS Market”, February 21, 2017. URL: https://seekingalpha.com/article/4048008-blackstoneacquires-cloudreach-foraccess-to-ipaas-market (дата звернення: 17.09.2021).

Published

2021-11-26

How to Cite

Худік, Н. (2021). MAIN ASPECTS OF SAFE USE OF CLOUD TECHNOLOGIES IN A COVID-19 PANDEMIC. Таuridа Scientific Herald. Series: Technical Sciences, (4), 24-32. https://doi.org/10.32851/tnv-tech.2021.4.3

Issue

Section

COMPUTER SCIENCE AND INFORMATION TECHNOLOGY