DOI: 10.11648/j.mcs.20240905.11 ISSN: 2575-6028
Managing Security Risks of Public Cloud Computing
Ayokunmi Ogundapo, Vitus Ezeaputa The economic benefits and scalability of public cloud computing are already undeniable due to recent advancements in the field; the only question that remains is cloud security. Despite the enormous benefits of moving their computing workload to the cloud, many organizations continue to show resistance to this change. Cloud security concerns are the most frequently mentioned cause. Organizations are concerned by a larger attack surface created by the worldwide accessibility of services in the cloud. The security and risk control set that enterprises can apply in the cloud is also often limited and impacted by the interoperability and support provided by the chosen Cloud Service Providers (CSPs), and organizations are often not allowed to extend their trusted security solutions they are already familiar with to the cloud. Yet, both traditional computing and cloud computing include security risks, and cloud risk is just as controllable as traditional IT risk. Secondary data obtained from Identity Theft Resource Centre (ITRC) database on cloud incidents from year 2020 to 2022 were analyzed in this study. To determine the primary underlying causes of cybersecurity events observed across the years covered by the available data, the study used trend analysis and descriptive statistics. The analysis shows that cloud incidents are not different from traditional incident and organizations can leverage existing capabilities already developed in traditional computing towards managing the cloud risk. Also, organizations need to take be proactive in their responsibility and take ownership of the risks. As the study shows, the majority of cloud incidents are caused by knowledge gaps and the cloud customer's inability to exercise due diligence and care in ensuring effective controls are put in place to stop prevalent attacks. Effective cloud training and adherence to the established cloud control matrix, like the CSA, would successfully lower risk to a reasonable level.
More from our Archive
-
DOI: 10.17491/jgsi/1993/410303 2024
Evolution of Southern Part of Indian East Coast Basins K. N. Prabhakar, P. L. Zutshi
-
DOI: 10.17491/jgsi/1990/360302 2024
Petrogenesis and the Mantle Source Characteristics of the Abor Volcanic Rocks, Eastern Himalayas M. I. Bhat, T. Ahmad
-
DOI: 10.17491/jgsi/1989/340205 2024
Dhosa Oolite - A Transgressive Condensation Horizon of Oxfordian Age in Kachchh, Western India Indra Bir Singh
-
DOI: 10.17491/jgsi/1981/220504 2024
Shilakong Ophiolite Nappe of Zanskar Mountains, Ladakh Himalaya S. V. Srikantia, M. L. Razdan
-
DOI: 10.17491/jgsi/1980/211101 2024
Geology of Part of Central Ladakh Himalaya with Particular Reference to Indus Tectonic Zone S. V. Srikantia, M. L. Razdan
-
DOI: 10.1213/ane.0000000000007156 2024
Comparison of Phenylephrine Bolus and Infusion Regimens on Maternal and Fetal Outcomes During Cesarean Delivery: A Systematic Review and Meta-Analysis Heena Garg, Vishnu Narayanan M R., Puneet Khanna, Bharat Yalla
-
DOI: 10.1177/0006355x2004041003004001 2024
Biomechanical properties of human articular cartilage under compressive loads Federica Boschetti, Giancarlo Pennati, Francesca Gervaso, Giuseppe M. Peretti, Gabriele Dubini
-
DOI: 10.3982/ecta21748 2024
Caution and Reference Effects Simone Cerreia-Vioglio, David Dillenberger, Pietro Ortoleva
-
DOI: 10.3982/ecta19697 2024
Matching and Agglomeration: Theory and Evidence From Japanese Firm‐to‐Firm Trade Yuhei Miyauchi
-
DOI: 10.3982/ecta18602 2024
Adaptive, Rate‐Optimal Hypothesis Testing in Nonparametric IV Models Christoph Breunig, Xiaohong Chen