Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber Security in Cloud Computing

View through CrossRef
Cloud computing cybersecurity must be offered by the elements that make up its structure. Accurately identifying the hazards associated with this technology is the first step towards improving its cybersecurity. This research proposes a new cybersecurity reference model for the cloud system, which is composed of parts that constitute different cloud computing layers. The virtualization and service layers, as well as other crucial elements for ensuring cloud computing cybersecurity, are not thoroughly covered by the reference models of cloud computing security that are currently available. Additionally, the social media IoT sensor layer, which gathers text data entered by attackers to launch cyberattacks on cloud infrastructure, and the cloud computing's cyber resilience issues are not taken into account. Furthermore, this study investigates cloud computing service models' cybersecurity concerns and builds an attack model to safeguard cloud systems. It provides an understanding of laws and standards about cloud computing cybersecurity. Clarification of cloud system cybersecurity and cyber resilience concepts is given by security aspects. Intelligent cloud systems' cyber resilience architecture is designed. The proposed cyber resilience model has an advantage over the existing one in that it identifies the cloud computing's information security and cybersecurity elements and combines them to build the cloud systems' cyber resilience aspects.
Title: Cyber Security in Cloud Computing
Description:
Cloud computing cybersecurity must be offered by the elements that make up its structure.
Accurately identifying the hazards associated with this technology is the first step towards improving its cybersecurity.
This research proposes a new cybersecurity reference model for the cloud system, which is composed of parts that constitute different cloud computing layers.
The virtualization and service layers, as well as other crucial elements for ensuring cloud computing cybersecurity, are not thoroughly covered by the reference models of cloud computing security that are currently available.
Additionally, the social media IoT sensor layer, which gathers text data entered by attackers to launch cyberattacks on cloud infrastructure, and the cloud computing's cyber resilience issues are not taken into account.
Furthermore, this study investigates cloud computing service models' cybersecurity concerns and builds an attack model to safeguard cloud systems.
It provides an understanding of laws and standards about cloud computing cybersecurity.
Clarification of cloud system cybersecurity and cyber resilience concepts is given by security aspects.
Intelligent cloud systems' cyber resilience architecture is designed.
The proposed cyber resilience model has an advantage over the existing one in that it identifies the cloud computing's information security and cybersecurity elements and combines them to build the cloud systems' cyber resilience aspects.

Related Results

THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
Cloud computing refers to the continuous availability of computer infrastructure technology, enabling the handling and storage of information without direct client management. Peop...
Cyber hygiene in the cloud: Training employees to be the first line of defence
Cyber hygiene in the cloud: Training employees to be the first line of defence
As organizations increasingly migrate operations, data, and applications to cloud environments, the attack surface for cyber threats expands, exposing vulnerabilities that can be e...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Securing U.S. national interests with cloud innovation: data sovereignty, threat intelligence and digital warfare preparedness
Securing U.S. national interests with cloud innovation: data sovereignty, threat intelligence and digital warfare preparedness
The rapid evolution of cyber warfare, geopolitical tensions, and foreign cyber threats necessitates a comprehensive cloud-driven security strategy to safeguard U.S. national intere...

Back to Top