security
Developing a Сomprehensive Internet Security System
The Dogmata of Secrecy: Are we Realistic about the Facts and Impact of Massive Leaks of Classified Information?
In recent years, massive leaks of classified information enabled by the Internet have been at the core of political andmedia attention. Wikileaks and the Snowden files are well known examples. Public and political opinions show a particular black-and-white division. On the one hand there is alarm about the abuse of powers by intelligence services and on the other hand about the possible risks to national security. If we look at the fact finding side of the latter position there appears to be a vacuum. Opinion and not factual or logical proof is dominating the debate at this side.
Concept and Model for Cloud Infrastructure Protection by Using Containers
According to current best practices in using containers we suggest an overview on using it in cloud and potential for using in security field. Interaction and attacks vectors used in virtual cloud systems are described. Built and analyzed conceptual scheme for penetration testing. Patterns of security improvements in cloud computing infrastructure are presented in following article.