S-ITC595 Research: Security Threats in Cloud Computing and Prevention

Verified

Added on  2022/12/21

|3
|502
|74
Report
AI Summary
This report delves into the critical security threats present in cloud computing environments. It highlights the increasing importance of security due to the widespread adoption of cloud-based services across various industries. The report identifies several threats, including malware, viruses, phishing, and social engineering, emphasizing their potential impact on data and organizational security. It underscores the need for robust security and privacy measures to manage cloud computing processes effectively. Furthermore, the report examines prevention techniques such as cryptography, network security, and encryption/decryption methods to mitigate these threats. The report also emphasizes the prevalence of cyber-attacks in cloud-based services and concludes by advocating for the implementation of preventive methods to secure client systems and networks against cloud-related vulnerabilities. The report is supported by references to relevant research articles, providing a comprehensive overview of the subject matter.
Document Page
Running Head: Security threats in cloud computing and preventive methods 0
Security threats in cloud computing
and preventive methods
Task
Student name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security threats in cloud computing and preventive methods 1
Security threats in cloud computing and preventive methods
Security is the first concern in cloud computing, as it maintains large amount of data. Cloud
computing is highly used in various industries for managing their business functions in a proper manner.
There are many advantages of cloud-based services in a company, such as cloud-based ERP, cloud-based
data storage, and many others. There are many security threats in cloud computing, as it has based on
network services, such as malware, viruses, malfunctions, phishing, social engineering, and many others
(Bhagat, 2012). In addition, there are many issues in cloud-based services and some issues may create
critical conditions in front of an organization. Therefore, it is necessary to manage various processes and
services of cloud computing using proper security and privacy. In addition, Cloud computing services
have used a network of the clients and it is necessary to secure the network as well as personal systems
of the clients (Chen & Zhao, 2012).
Moreover, many benefits of cloud-based services for an organization, therefore, most of the
firms have implemented cloud-based services to improve their performance. Besides, security issues
have risen in cloud-based services. These security issues can make an impact on data and security.
However, organizations can manage their security and privacy of data and information (Krutz & Vines,
2010). Furthermore, various prevention techniques, such as cryptography, network security,
compression, and many others can avoid security issues. Encryption and decryption are the most
popular methods for the security of data in a network. Cyber-attacks are common in cloud-based
services. Finally, prevention methods can be useful for cloud computing and organizations. It will secure
all the systems and networks of the clients from various threats of cloud-based services (Yan, Deng, &
Varadharajan, 2017).
Document Page
Security threats in cloud computing and preventive methods 2
References
Bhagat, B. (2012). Patent No. 13/016,999. U. S.
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing.
International Conference on Computer Science and Electronics Engineering, 1(1), 647-651.
Krutz, R., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. .
London: Wiley Publishing.
Yan, Z., Deng, R. H., & Varadharajan, V. (2017). Cryptography and data security in cloud computing.
Elsevier, 53(1), 3. doi:10.1016/j.ins.2016.12.034
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]