Information security threats in cloud services: a comprehensive overview
Ali, Mohammad (2025)
Ali, Mohammad
2025
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2025060420050
https://urn.fi/URN:NBN:fi:amk-2025060420050
Tiivistelmä
Cloud computing has completely changed how individuals, companies, and organizations manage, store, and analyse data, enabling open and affordable solutions. However, switching to cloud services has resulted in major issues with information security.
Cloud security challenges include data breaches, software attacks, DoS attacks, and insider threats, while complex cloud settings can make data monitoring and management difficult for organizations. Cloud settings are prone to risks because they use shared technology, have multiple tenants, and depend on third-party sources. These factors can lead to data breaches, prohibited entry, and other security difficulties.
This study comprehensively examines the main security challenges that come with cloud settings, including data breaches, account theft, and APIs that may not be secure. Additionally, cloud platforms are extremely fascinating to hackers because they easily access and store data in one place.
This study combined insights from the previous study and a case study analysis from a practical perspective. It examined a real-life case to show how security issues in cloud services affect daily lives. This study provides security practitioners, IT professionals, and organizations with an understanding of the dynamic cloud threat environment and practical risk-reduction techniques. Organizations may fully use cloud computing while preserving a safe and reliable digital environment by coordinating cloud infrastructure and procedures with strong security standards.
Cloud security challenges include data breaches, software attacks, DoS attacks, and insider threats, while complex cloud settings can make data monitoring and management difficult for organizations. Cloud settings are prone to risks because they use shared technology, have multiple tenants, and depend on third-party sources. These factors can lead to data breaches, prohibited entry, and other security difficulties.
This study comprehensively examines the main security challenges that come with cloud settings, including data breaches, account theft, and APIs that may not be secure. Additionally, cloud platforms are extremely fascinating to hackers because they easily access and store data in one place.
This study combined insights from the previous study and a case study analysis from a practical perspective. It examined a real-life case to show how security issues in cloud services affect daily lives. This study provides security practitioners, IT professionals, and organizations with an understanding of the dynamic cloud threat environment and practical risk-reduction techniques. Organizations may fully use cloud computing while preserving a safe and reliable digital environment by coordinating cloud infrastructure and procedures with strong security standards.