The Cloud and Government Intervention within Cyberspace

Bogdan Nedelcu, Andreea Nedelcu, Alexandru Ioan Sgarciu

Abstract


The aim of this article is to show the importance of cyber security and its growing influence on companies. We can also see how much companies are willing to invest in security. In this cyber security era, there is a fiercely competition between companies and the technologies they use to protect themselves against threats.


Keywords


cybersecurity, cloud, spam, malware

Full Text:

PDF

References


Symantec Internet Security Threat Report, https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf

T. Mather, S. Kumaraswamy, S. Latif, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”

Study on advantages and disadvantages of Cloud Computing – the advantages of Telemetry Applications in the Cloud, http://www.wseas.us/e-library/conferences/2013/Morioka/DSAC/DSAC-16.pdf

S. Morshed, P. Goswami, ”Cloud Computing: A Survey on its limitations and Potential Solutions ”

B. Potter, L. M. Kaufman, J. Harauz, “Data Security in the World of Cloud Computing”

“About ITU”, http://www.itu.int/net/about/index.aspx

“Cyber Security Division Transition to Practice Technology Guide ”, https://www.dhs.gov/sites/default/files/publications/CSD%20TTP%20FY16%20Tech%20Guide.pdf

“Our History”, http://www.jhuapl.edu/aboutapl/heritage/default.asp

“Fact Sheet”, http://www.lanl.gov/about/facts-figures/fact-sheet.php




DOI: http://dx.doi.org/10.52155/ijpsat.v23.1.2274

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Bogdan Nedelcu

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.