Cyber-aware threats and management strategies in cloud environments
DOI:
https://doi.org/10.15276/hait.07.2024.11Keywords:
Cloud computing, security threats, vulnerabilities, cybersecurity, cloud service provider, softwareAbstract
The paper provides an overview of cyber threats within cloud computing and proposes effective management strategies. The transition to cloud services has introduced significant security concerns, particularly regarding data protection and privacy. The study aims to catalogue an exhaustive inventory of threats, analyse their prevalence, and thoroughly study applicable security mechanisms. The authors conducted an in-depth literature review, focusing on articles published after 2018, to identify vulnerabilities, attack vectors, and mitigation strategies. The paper categorises various cyber threats, such as malware, phishing, man-in-the-middle attacks, denial-of-service attacks, and SQL injections, and discusses their potential to infiltrate, deceive, disrupt, and steal data. It also highlights the importance of securing internet-connected devices and recommends strategies like robust password policies and regular software updates. The paper concludes by emphasising the need for adaptive security strategies to combat the evolving nature of cyber threats. It advocates for a dynamic approach to security, integrating robust defence mechanisms, continuous monitoring, and rapid response protocols. By prioritising cybersecurity, organisations can navigate the complexities of cloud computing, ensuring their data assets' integrity, confidentiality, and availability in a digital landscape. The findings are a foundation for crafting a security framework tailored to applications operating within cloud environments.