-
Cybersecurity In Cloud Computing (exploring Current Threats And Solutions)
-
-
-
This thesis explores current cybersecurity threats and solutions in cloud computing to enhance the security and privacy of data stored in the cloud. The aim of this study is to identify major cybersecurity threats facing cloud computing, examine existing solutions and technologies used to mitigate these threats, evaluate the effectiveness of current cybersecurity practices, and propose recommendations for improving the security of cloud computing environments.
The scope of this study includes cybersecurity threats and solutions in cloud computing, with a focus on data breaches, data loss, threats, and shared technology vulnerabilities. The methodology adopted is qualitative, utilizing a literature review to explore current cybersecurity threats and solutions. Relevant academic papers, industry reports, and case studies will be reviewed, and interviews with cybersecurity experts and cloud service providers will be conducted to gain insights into the effectiveness of current cybersecurity practices in cloud computing.
The findings of this study reveal various solutions and technologies employed to mitigate cybersecurity threats in cloud computing. Encryption, access control mechanisms, Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols, and Intrusion Detection and Prevention Systems (IDPS) are among the key technologies used. Blockchain technology is also emerging as a promising solution for enhancing security in cloud computing, offering decentralized and immutable data storage. Recommendations for improving the security of cloud environments include implementing enhanced encryption practices, strengthening access control mechanisms, exploring the adoption of blockchain technology, conducting regular security audits and penetration testing, and providing regular training and awareness programs for employees.
-
-
-
CHAPTER ONE - [ Total Page(s): 1 ]1.1 Preamble Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks. These attacks often aim to access, change, or destroy sensitive information, extort money from users, or disrupt normal business processes. Cybersecurity measures include using antivirus software, firewalls, secure passwords, and implementing other techniques to safeguard data and systems Khaleefah and Al-Mashhadi,(2024).Cloud computing, on the other hand, is a technology th ... Continue reading---
-
CHAPTER ONE - [ Total Page(s): 1 ]1.1 Preamble Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks. These attacks often aim to access, change, or destroy sensitive information, extort money from users, or disrupt normal business processes. Cybersecurity measures include using antivirus software, firewalls, secure passwords, and implementing other techniques to safeguard data and systems Khaleefah and Al-Mashhadi,(2024).Cloud computing, on the other hand, is a technology th ... Continue reading---
ABSRACT -- [Total Page(s) 1]
Page 1 of 1
ABSRACT -- [Total Page(s) 1]
Page 1 of 1