【24h】

Authentication Process Threats in the Cloud Technologies

机译:云技术中的身份验证过程威胁

获取原文
获取原文并翻译 | 示例

摘要

The most challenging question in cybersecurity is protection the authentication process. Since a lot of companies decide to store their data in the cloud services, it is crucial to secure the authentication process here. First, I need to research all current threats to this process. Second, when I have all information for analyzing all vulnerabilities and find the best way to protect weak sides. Such research is needed because we need to know which exactly threats can lead to horrible consequences as identity thefts, data misuse, a compromise and so on. In this article, it is represented the main threats to the authentication process in the cloud services. The results show the focuses of the leading companies in the cybersecurity area. It makes easier to predict future threats and try to avoid them.
机译:网络安全中最具挑战性的问题是保护身份验证过程。由于许多公司决定将其数据存储在云服务中,因此确保此处的身份验证过程至关重要。首先,我需要研究当前对该过程的所有威胁。其次,当我掌握了用于分析所有漏洞的所有信息并找到保护弱方的最佳方法时。需要进行这样的研究,因为我们需要知道哪些确切的威胁会导致身份盗窃,数据滥用,破坏等可怕的后果。在本文中,它代表了云服务中身份验证过程的主要威胁。结果显示了网络安全领域领先公司的关注重点。它使预测未来的威胁并设法避免它们变得更加容易。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号