Table 2. Cloud Security Issues and Classifications.Category Label Issu terjemahan - Table 2. Cloud Security Issues and Classifications.Category Label Issu Bahasa Indonesia Bagaimana mengatakan

Table 2. Cloud Security Issues and

Table 2. Cloud Security Issues and Classifications.
Category Label Issues
Security Standards
I1 Lack of security standards
I2 Compliance risks
I3 Lack of auditing
I4 Lack of legal aspects (Service level agreement)
I5 Trust
Network
I6 Proper installation of network firewalls
I7 Network security configurations
I8 Internet protocol vulnerabilities
I9 Internet Dependence
Access
I10 Account and service hijacking
I11 Malicious insiders
I12 Authentication mechanism
I13 Privileged user access
I14 Browser Security
Cloud Infrastructure
I15 Insecure interface of API
I16 Quality of service
I17 Sharing technical flaws
I18 Reliability of Suppliers
I19 Security Misconfiguration
I20 Multi-tenancy
I21 Server Location and Backup
Data
I22 Data redundancy
I23 Data loss and leakage
I24 Data location
I25 Data recovery
I26 Data privacy
I27 Data protection
I28 Data availability
Network category (C2) related issues are deemed to be the biggest security challenges in clouds since
cloud computing is more prone to network related attacks compared to the traditional computing
paradigms [2]. In addition, cloud operations are tightly coupled and highly depend on networking.
Therefore, cloud network security issues receive more attention in this work compared to the other
security categories. The ratio of network attacks and fraud dramatically increases as people and
organizations migrate their data into clouds. Security experts anticipate that clouds will be the focus of
hackers in future due to the concentration of valuable “assets” (data and computation) within the clouds.
The possible lack of proper installations of network firewalls (I6) and the overlooked security
configurations (I7) within clouds and on networks, make it easier for hackers to access the cloud on
behalf of legitimate users [35]. Hackers can occupy resources (hardware/application) by generating
bogus data or they can run malicious code on the hijacked resources. Denial of service can be launched
by first identifying vulnerabilities in Internet protocols (I8) such as SIP (Session Initiation Protocol)
which could deem the Internet to be un-trusted [36]. Migrating to cloud will increase the Internet
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
Table 2. Cloud Security Issues and Classifications.Category Label IssuesSecurity StandardsI1 Lack of security standardsI2 Compliance risksI3 Lack of auditingI4 Lack of legal aspects (Service level agreement)I5 TrustNetworkI6 Proper installation of network firewallsI7 Network security configurationsI8 Internet protocol vulnerabilitiesI9 Internet DependenceAccessI10 Account and service hijackingI11 Malicious insidersI12 Authentication mechanismI13 Privileged user accessI14 Browser SecurityCloud InfrastructureI15 Insecure interface of APII16 Quality of serviceI17 Sharing technical flawsI18 Reliability of SuppliersI19 Security MisconfigurationI20 Multi-tenancyI21 Server Location and BackupDataI22 Data redundancyI23 Data loss and leakageI24 Data locationI25 Data recoveryI26 Data privacyI27 Data protectionI28 Data availabilityNetwork category (C2) related issues are deemed to be the biggest security challenges in clouds sincecloud computing is more prone to network related attacks compared to the traditional computingparadigms [2]. In addition, cloud operations are tightly coupled and highly depend on networking.Therefore, cloud network security issues receive more attention in this work compared to the othersecurity categories. The ratio of network attacks and fraud dramatically increases as people andorganizations migrate their data into clouds. Security experts anticipate that clouds will be the focus ofhackers in future due to the concentration of valuable “assets” (data and computation) within the clouds.The possible lack of proper installations of network firewalls (I6) and the overlooked securityconfigurations (I7) within clouds and on networks, make it easier for hackers to access the cloud onbehalf of legitimate users [35]. Hackers can occupy resources (hardware/application) by generatingbogus data or they can run malicious code on the hijacked resources. Denial of service can be launchedby first identifying vulnerabilities in Internet protocols (I8) such as SIP (Session Initiation Protocol)which could deem the Internet to be un-trusted [36]. Migrating to cloud will increase the Internet
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
Tabel 2. Cloud Security Isu dan Klasifikasi.
Kategori Label Masalah
Keamanan Standar
I1 Kurangnya standar keamanan
Kepatuhan I2 risiko
I3 Kurangnya audit
I4 Kurangnya aspek hukum (Service level agreement)
I5 Kepercayaan
Jaringan
I6 instalasi yang tepat dari jaringan firewall
I7 Jaringan konfigurasi keamanan
I8 protokol Internet kerentanan
I9 Ketergantungan Internet
Access
I10 Akun dan layanan pembajakan
I11 orang dalam berbahaya
I12 mekanisme Authentication
I13 pengguna Keistimewaan akses
I14 Browser Keamanan
Cloud Infrastructure
I15 antarmuka tidak aman dari API
I16 Kualitas layanan
I17 Berbagi kekurangan teknis
I18 Keandalan Pemasok
I19 Keamanan Misconfiguration
I20 Multi sewa
I21 Server Backup Lokasi dan
data
I22 data redundansi
kerugian I23 Data dan kebocoran
lokasi I24 data
I25 data recovery
I26 data privasi
I27 perlindungan data
I28 data ketersediaan
kategori Jaringan (C2) isu-isu terkait yang dianggap sebagai tantangan keamanan terbesar di awan sejak
komputasi awan lebih rentan terhadap serangan jaringan terkait dibandingkan dengan komputasi tradisional
paradigma [2]. Selain itu, operasi awan erat dan sangat tergantung pada jaringan.
Oleh karena itu, masalah keamanan jaringan cloud menerima lebih banyak perhatian dalam pekerjaan ini dibandingkan dengan yang lain
kategori keamanan. Rasio serangan jaringan dan penipuan secara dramatis meningkat sebagai orang-orang dan
organisasi migrasi data mereka ke dalam awan. Para ahli keamanan mengantisipasi bahwa awan akan menjadi fokus
hacker di masa depan karena konsentrasi berharga "aset" (data dan perhitungan) dalam awan.
Kemungkinan adanya instalasi yang tepat dari firewall jaringan (I6) dan keamanan diabaikan
konfigurasi (I7 ) dalam awan dan jaringan, memudahkan hacker untuk mengakses cloud pada
nama pengguna yang sah [35]. Hacker dapat menempati sumber daya (hardware / aplikasi) dengan menghasilkan
data palsu atau mereka dapat menjalankan kode berbahaya pada sumber daya dibajak. Penolakan layanan dapat diluncurkan
oleh kerentanan pertama mengidentifikasi di Internet protokol (I8) seperti SIP (Session Initiation Protocol)
yang bisa menganggap internet menjadi un-dipercaya [36]. Migrasi ke awan akan meningkatkan Internet
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: