ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey of Security Threats and Countermeasures in Cloud Computing

Journal: United International Journal for Research & Technology (Vol.02, No. 07)

Publication Date:

Authors : ; ;

Page : 201-207

Keywords : Cloud Computing; Cyber attacks; Cyber threats; Deployment; Security.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is one of the most trending IT domains in recent times. It allows a user to access state-of-theart resources, technology and infrastructure with just an internet connection. In the past few decades, most global organisations have begun to migrate towards cloud computing environments because of the plethora of advantages that are provided. Cloud computing technology is now growing at a rapid rate and it has become more convenient for organisations to transfer their workload onto the cloud. It calls for less investment and promises delivery of the latest technology at a high velocity. However, security has now become a common concern for the safety of a cloud computing environment. If the cloud environment is not built securely then it can face a lot of cyber threats which take advantage of the vulnerabilities in the system. This puts the assets, resources and the data belonging to a cloud environment at risk. This paper discusses in about the top cyber threats that a cloud computing environment faces. It also covers the countermeasures and the practices that a cloud provider should follow in order to ensure that the cloud environment is robust and impenetrable.

Last modified: 2021-06-03 10:39:58