CONSIDERING RISKS WHEN USING INFORMATION TECHNOLOGY

Authors

DOI:

https://doi.org/10.32782/IT/2024-4-10

Keywords:

risks, threats, information technologies, cloud technologies.

Abstract

The article examines risks and threats when using information and communication technologies. The purpose of the study is to identify the main types of risks and threats when storing data in the cloud. To achieve this goal, a set of measures to form the foundations of cybersecurity has been identified. It is emphasized that, taking into account today’s challenges, not only cyber literacy of information and communication technology users is required, but also coordination and reorientation of research in the field of computer development, because new generations of software and hardware must guarantee the security of activities and compliance with the principle of confidentiality of private, business or state information. Research methodology. The methodological aspects of the study take into account the concept of identifying patterns of the emergence of new risks and threats to information and cyber security in modern conditions of rapid development of information technologies. The work used a set of interrelated scientific methods, in particular: dialectical, comparative analysis and logical when studying the essence of threats to information security in modern conditions of uncertainty and risk; empirical research method when comparing the features of the provision of cloud services by IT services; systematic approach when identifying a set of measures to form the foundations of cybersecurity. The scientific novelty lies in an integrated approach to studying the essence of risks and threats to information and cyber security in the context of the rapid development of information and communication technologies and when using cloud services. Conclusions. As a result of the theoretical study, risks and threats to cyber security were identified. It is emphasized that the operational identification of new types of threats and risks, the determination of their key characteristics will contribute to the delineation of their essential properties, the development of algorithms for their analysis and methods for managing them.

References

Гайдук О., Звєрєв В. Аналіз кіберзагроз в умовах стрімкого розвитку інформаційних технологій. Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка».2024, № 3 (24). С. 225–236. https://doi.org/10.28925/2663-4023.2024.23.225236.

Лисеюк А., Свінцицька Т. Правове забезпечення кібербезпеки України в умовах воєнного стану та євроїнтеграції. Право та інновації, 2024, № 4 (48), с. 32–38. https://doi.org/10.37772/2518-1718-2024-4(48)-4.

Мовчан К. О. Ризики кібербезпеки в епоху робототехніки. Вчені записки ТНУ імені В. І. Вернадського. Серія: Технічні науки. 2023, Том 34 (73). с. 79–83. https://doi.org/10.32782/2663-5941/2023.4/13.

Salesforce.com. URL: https://www.salesforce.com/.

Google.Inс. URL: https://www.google.com/.

Microsoft OneDrive. URL: https://www.microsoft.com/uk-ua/microsoft-365/onedrive/online-cloud-storage.

Dropbox Inc. URL: https://www.dropbox.com/uk_UA/.

Published

2025-02-17