**Abstract**

php?title=Systems\_theory&oldid= 935325354 [Accessed: 06 March 2020]

*Cloud Computing Security - Concepts and Practice*

[60] Dubrovsky VY. Three System Paradigms (Plato, Aristotle, Schedrovitsky). Kudymkar: Studia Korolevae Int; 2020. [In Russian]

[61] Zilberman DB. Genesis of Meaning in Hindu Philosophy. Moscow: Editorial URSS; 1998. p. 448. [In Russian]

[62] Ackoff RL. A Concept of Corporate

Korolev PM. Observation and Audit of the Processes in Experiences with Uncertainty. Journal of Computer Engineering & Information Technology. 2016;**5**:4. DOI: 10.4172/2324-9307.

[64] Aristova S, Korolev P. Knowledgeinformation transformation: Reflexive

Symposium on Reflexive Control; 17-19 October 2000; Moscow. Moscow: RAS Institute on Psychology; 2000. pp. 61-62.

games on human language. In: Proceedings of International

[65] George Braziller Inc. General System theory: Foundations,

Development, Applications. Revised edition 1976. New York: George Braziller Inc. 1968. ISBN: 0-8076-

Planning. New York: Wiley-Interscience; 1970. 158 p

[63] Daradkeh YI, Aristova SM,

1000163

[In Russian]

0453-4

**54**

The Internet has become an essential part of daily life for almost everyone in society having grown far beyond its roots in the 1970s as the ARPANET, a network that was principally the domain of scientists and engineers. The popularity of the HTTP, developed at CERN in the late 1980s led to the widespread use of the term 'the web' as a generic name for the Internet for many years, at least in the public domain. Of course, the Internet is much more than just web browsing and, in recent years, the term cyberspace has become the most popular term to describe interactions over the Internet. Yet, an unambiguous definition of the term is difficult to formulate . Financial institutions underpinning the economy and the operation of national critical infrastructures, such as monitoring and control of the electricity supply, are now dependent on the Internet. A consequence of this is that cyberattacks become more costly for the victims and perversely more attractive to the criminals who carry them out . The advent of the Internet of Things (IoT) and edge computing as a new paradigm creates the potential for enhanced productivity but at the same time opens up new opportunities for cyberattacks while still being exposed to existing attach vectors such as the well-known denial of service attack (DDoS), which can take place in many forms . In this chapter, we described the challenges in building an edge system that is secure against cyberattack. We begin by briefly reviewing the architecture of communications over the Internet and later consider the new challenges that follow from operating the hardware with values of voltage, frequency and current that enable more energy efficiency.

**Keywords:** security, energy efficiency, performance, cloud, edge computing
