Please use this identifier to cite or link to this item: https://dspace.kmf.uz.ua/jspui/handle/123456789/5768
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBohdan Ilchenkoen
dc.contributor.authorOlena Hurskaen
dc.contributor.authorГурська Оленаuk
dc.date.accessioned2026-01-20T18:14:59Z-
dc.date.available2026-01-20T18:14:59Z-
dc.date.issued2025-
dc.identifier.citationIn Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 29-30.en
dc.identifier.isbn978-617-8143-50-3 (puhatáblás)-
dc.identifier.isbn978-617-8143-51-0 (PDF)-
dc.identifier.urihttps://dspace.kmf.uz.ua/jspui/handle/123456789/5768-
dc.descriptionTeljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/en
dc.description.abstractAbstract. In recent years, cloud computing has become one of the most rapidly developing areas of information technology. Owing to its scalability, flexibility, and cost efficiency, cloud computing has become integral to business operations, education, healthcare, and scientific research. However, as more people use cloud technology, the number and complexity of cyber threats also rise. This situation highlights the urgent need for effective cybersecurity measures in cloud computing environments. The relevance of this research lies in the growing dependency on cloud-based systems and the consequent need to secure them against evolving attacks. The novelty of the study is determined by the integration of recent technological advancements, such as artificial intelligence, blockchain, and quantum cryptography, into the field of cybersecurity. The objective of this thesis is to analyze the main risks associated with cloud computing and to examine the most effective modern and emerging methods for ensuring cybersecurity in these environments. The transition to cloud-based infrastructure introduces new vulnerabilities and attack surfaces for cybercriminals. Unlike traditional IT systems, where organizations maintain full control over access and security policies, cloud resources are typically shared among multiple users and accessible over the Internet. This makes it easier for unauthorized people to get in and cause trouble.en
dc.language.isoenen
dc.publisherII. Rákóczi Ferenc Kárpátaljai Magyar Egyetemen
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectApplication Programming Interfaces (API)en
dc.subjectDistributed Denial of Service (DDoS)en
dc.subjectcloud computingen
dc.subjectcybersecurityen
dc.titleCybersecurity in cloud computing environmentsen
dc.typedc.type.conferenceAbstracten
Appears in Collections:A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben

Files in This Item:
File Description SizeFormat 
Cybersecurity_in_cloud_computing_environments_2025.pdfIn Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 29-30.10 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons