"Financial Information Security In The Cloud "
نویسندگان
چکیده
منابع مشابه
Privacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملInformation Security Risk in Financial Institutions
The history of technology and banking is examined as it relates to risk and technological determinism. It is proposed that the services that banks offer are determined by technology and that banks must adopt new technologies to be competitive. The adoption of technologies paradoxically forces the adoption of other new technologies to protect the bank from the increased risk of technology. This ...
متن کاملCloud Computing and Information Security
The article takes into account cloud computing and information security. It is shown, that in spite of the advantage from costs point of view the data placed within the cloud are still not safe, due to the fact that providers are not able to secure data from physical point of view. So the customers have not physical control of theirs data. Existing standard activities cloud for data security do...
متن کاملCloud Computing Security in Business Information Systems
Cloud computing providers‘ and customers‘ services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annales Universitatis Apulensis Series Oeconomica
سال: 2013
ISSN: 1454-9409,2344-4975
DOI: 10.29302/oeconomica.2013.15.2.9