MANAGING THREATS IN CLOUD COMPUTING: A CYBERSECURITY RISK MITIGATION FRAMEWORK
Main Article Content
Abstract
Data processing, management, and storage have all been changed by the internet of things, which offers
companies scalable and reasonably priced solutions. There is serious cybersecurity concerns connected to
using cloud services, such as service outages, unauthorized access, and data breaches. Investigating these
security threats and developing defences to enhance cloud security are the goals of this study. This study
reviews current security mechanisms including encryption, authentication, and access control and
highlights critical vulnerabilities in cloud systems through a methodical literature analysis and risk
assessment. To assist enterprises in evaluating and prioritizing cloud security concerns, the study suggests
a risk assessment methodology. To strengthen cloud computing's overall security posture, best practices
and security solutions are also advised. The results of this study will help create cloud infrastructures that
are more secure, guaranteeing data availability, confidentiality, and integrity in the rapidly changing
digital environment.
Keywords: Cloud computing, cybersecurity, risk mitigation, data security, access control,
Encryption
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.