Title: Authentication Process Threats in the Cloud Technologies
Abstract:The most challenging question in cybersecurity is protection the authentication process. Since a lot of companies decide to store their data in the cloud services, it is crucial to secure the authenti...The most challenging question in cybersecurity is protection the authentication process. Since a lot of companies decide to store their data in the cloud services, it is crucial to secure the authentication process here. First, I need to research all current threats to this process. Second, when I have all information for analyzing all vulnerabilities and find the best way to protect weak sides. Such research is needed because we need to know which exactly threats can lead to horrible consequences as identity thefts, data misuse, a compromise and so on. In this article, it is represented the main threats to the authentication process in the cloud services. The results show the focuses of the leading companies in the cybersecurity area. It makes easier to predict future threats and try to avoid them.Read More
Publication Year: 2018
Publication Date: 2018-10-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 4
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot