Hyppää sisältöön
    • Suomeksi
    • På svenska
    • In English
  • Suomi
  • Svenska
  • English
  • Kirjaudu
Hakuohjeet
JavaScript is disabled for your browser. Some features of this site may not work without it.
Näytä viite 
  •   Ammattikorkeakoulut
  • Kaakkois-Suomen ammattikorkeakoulu
  • Opinnäytetyöt
  • Näytä viite
  •   Ammattikorkeakoulut
  • Kaakkois-Suomen ammattikorkeakoulu
  • Opinnäytetyöt
  • Näytä viite

Information security threats in cloud services: a comprehensive overview

Ali, Mohammad (2025)

Avaa tiedosto
Ali_Mohammad.pdf (1.699Mt)
Lataukset: 


Ali, Mohammad
2025
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2025060420050
Tiivistelmä
Cloud computing has completely changed how individuals, companies, and organizations manage, store, and analyse data, enabling open and affordable solutions. However, switching to cloud services has resulted in major issues with information security.
Cloud security challenges include data breaches, software attacks, DoS attacks, and insider threats, while complex cloud settings can make data monitoring and management difficult for organizations. Cloud settings are prone to risks because they use shared technology, have multiple tenants, and depend on third-party sources. These factors can lead to data breaches, prohibited entry, and other security difficulties.
This study comprehensively examines the main security challenges that come with cloud settings, including data breaches, account theft, and APIs that may not be secure. Additionally, cloud platforms are extremely fascinating to hackers because they easily access and store data in one place.
This study combined insights from the previous study and a case study analysis from a practical perspective. It examined a real-life case to show how security issues in cloud services affect daily lives. This study provides security practitioners, IT professionals, and organizations with an understanding of the dynamic cloud threat environment and practical risk-reduction techniques. Organizations may fully use cloud computing while preserving a safe and reliable digital environment by coordinating cloud infrastructure and procedures with strong security standards.
Kokoelmat
  • Opinnäytetyöt
Ammattikorkeakoulujen opinnäytetyöt ja julkaisut
Yhteydenotto | Tietoa käyttöoikeuksista | Tietosuojailmoitus | Saavutettavuusseloste
 

Selaa kokoelmaa

NimekkeetTekijätJulkaisuajatKoulutusalatAsiasanatUusimmatKokoelmat

Henkilökunnalle

Ammattikorkeakoulujen opinnäytetyöt ja julkaisut
Yhteydenotto | Tietoa käyttöoikeuksista | Tietosuojailmoitus | Saavutettavuusseloste