Cloud Computing Security: Threats, Prevention, and Mitigation (ITC595)

Verified

Added on  2025/04/30

|4
|321
|462
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes cloud computing security threats and preventive methods.
Document Page
ITC595 - INFORMATION
SECURITY - ASSESSMENT
ITEM 3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Security threats in cloud computing and preventive methods.........................................................3
Abstract............................................................................................................................................3
References........................................................................................................................................4
Document Page
Security threats in cloud computing and preventive methods
Abstract
Latest development and advancement in the field of internet and computing system attracted
large amount of users and organizations towards the latest trend of Cloud computing due to
flexibility and easier to use for the users through Internet which has high risk of security in order
maintain secure connection as well as transfer of files and important data from user’s device to
the cloud server. Security is one of the significant factors for Cloud computing technology. It
provides a real experience of virtualization and their implementation in the real world for
effective work experience to provide a better online platform for the user across the world
(Barron et al. 2013). But with the exponential rise in use of cloud computing technology and
service for the online activities such as access online web servers, storage of important files on
the cloud storage and many others also increased the cases of online attacks and hackers
activities on the online cloud servers and data storage servers to compromise and hack large
amount of customers sensitive data as well as important files and information stored over the
cloud storage for an organization. It provided multiple new opportunities for security
professionals to develop and implement new techniques such as access management, data
protection, enhancement of security applications, software and policies to provide better security
for the cloud computing and their users to minimize attacks and hacks over cloud storage and
computing networks (Chou, 2013).
Document Page
References
Chou, T. S. (2013). Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), 79.
Barron, C., Yu, H., and Zhan, J. (2013). Cloud computing security case studies and research. In
Proceedings of the World Congress on Engineering (Vol. 2, No. 2, pp. 1-6).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]