Enterprise Data Security in the Cloud Environment: Threat Analysis
Journal Title: Oblik i finansi - Year 2023, Vol 1, Issue 4
Abstract
Wider use of cloud services leads to increased cyber attacks on data arrays in cloud storage. Ensuring privacy in the cloud comes at a cost, and businesses are willing to bear these costs for data security. However, there is still a high risk of data being tracked and stolen due to existing vulnerabilities in the Internet environment. The purpose of the article is to analyze threats to data in the cloud environment under conditions of uncertainty and to reveal their increase in the virtual IT infrastructure of the enterprise. The advantages and disadvantages of enterprises using cloud services for data storage were revealed. Considering the amount of financial losses and reputational risks, the issue of protecting networks and services in the cloud, especially when hosting confidential or secret information, is a priority for enterprises of all industries. According to Significant Cyber Incidents, cyber incidents against government, defence and high-tech companies in the world were analyzed during 2021-2022. It was found that the attacks were primarily aimed at critical infrastructure enterprises and government organizations. Analysis of data from the Future Risk Report 2022 shows that climate change, geopolitical tensions, cyber security risks, and energy risks will remain the most significant risks over the next decade. It was revealed that since the beginning of the full-scale invasion, the number of attacks on Ukrainian enterprises of critical infrastructure and the telecommunications sphere has increased significantly. This shows that hacker attacks are one of the tools of hybrid warfare, capable of causing significant damage to the country's economy. The revealed trend in Ukraine confirms the predictions of international experts that cyber threats will grow in conditions of uncertainty and geopolitical instability. The article provides a chronology of massive cyberattacks on Ukrainian enterprises and organizations in the IT sphere over the past two years. It was determined that the means of reducing risks in the field of cyber security, which lead to the saving of costs of enterprises for data security, are the tools of artificial intelligence of security and further automation of threat identification. Thus, cyber security becomes an integral component in ensuring the full functioning of the enterprise, and the ways and means of its achievement require further research.
Authors and Affiliations
Tetiana Kapeliushna
Практична концептуалізація інформаційно-аналітичного забезпечення управління відтворенням біологічного капіталу скотарства
У статті досліджено особливості практичної реалізації концепції інформаційно-аналітичного забезпечення процесів формування та використання біологічного капіталу скотарства. Обґрунтовано необхідність диференціації інформа...
Борговий тягар фінансової системи України та країн-членів Європейського Союзу
Тенденція до зростання боргового навантаження фінансової системи України простежується упродовж вже декількох останніх років. Вітчизняні методичні положення та рекомендації, які мали призупинити нарощення боргового наван...
Effect of Female CEO and CFO on Cash Holdings on Food and Beverages Companies Listed on Indonesia Stock Exchange
The current trend in the management of large companies is implementation of the gender diversity measures. The existence of women at the top management became one of the growing issues recently, especially in corporate g...
Accounting and Analytical Support of Audit at Logistics Enterprises as an Effective Method of Risks Prevention
In any commercial activity, there is always a risk of loss. And logistics, of course, is no exception, regardless of whether it is one of the stages of the company's commercial activity or a separate business. Management...
Оцінка біологічних активів як елемент методу бухгалтерського обліку
В умовах наближення вітчизняного бухгалтерського обліку до міжнародних і європейський стандартів оцінка біологічних активів потребує особливої уваги з огляду на існування різних підходів до її проведення. Метою статті є...