2022
DOI: 10.14704/web/v19i1/web19015
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of Cloud Computing on Network Security and the Risk for Organization Behaviors

Abstract: Cloud computing is currently provided consumer or business IT support via social media or by using the internet. Cloud computing on the other hand, is increasing the level of the network security risk due to the services are basically presented by a third party. This results in hard to control the privacy and data security. In addition, to maintain the service availability and support data collections. Cloud computing clouts several technologies such as virtualization, SOA, and Web 2.0, it is also claimed thei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Cloud computing is one of the fastest-growing markets in the software industry predicted to hit $791.48 Billion by 2028 [71]. This is despite cloud computing facing the triple whammy of privacy breaches, security threats, and interoperability flaws [72]. Notwithstanding these shortcomings, the "-as-a-Service" cloud computing model has grown exponentially because of its advantages over legacy systems.…”
Section: Azt: a Cloud Continuummentioning
confidence: 99%
See 1 more Smart Citation
“…Cloud computing is one of the fastest-growing markets in the software industry predicted to hit $791.48 Billion by 2028 [71]. This is despite cloud computing facing the triple whammy of privacy breaches, security threats, and interoperability flaws [72]. Notwithstanding these shortcomings, the "-as-a-Service" cloud computing model has grown exponentially because of its advantages over legacy systems.…”
Section: Azt: a Cloud Continuummentioning
confidence: 99%
“…OS serves as the core that binds all the layers together. As much as OS is the heart of a computer, it is also directly or indirectly responsible for almost all the reported vulnerabilities [72]. Can we make the OS more reliable and secure?…”
Section: Operating Systems: a Historical Perspective From "No Os" To ...mentioning
confidence: 99%
“…Proper network segmentation and security group configurations within the cloud environment help minimize the risk of lateral movement by isolating resources and limiting communication between different components. Implementing firewalls and intrusion detection and prevention systems (IDPS) can add an extra layer of defense by monitoring network traffic and identifying potential threats 3 . Keeping cloud infrastructure, virtual machines, and software up to date with the latest security patches is essential for mitigating vulnerabilities that can be exploited by attackers.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…Yet, cloud environments also raise certain security concerns that may hinder their adoption. Virtualization, storage, and networks, as mentioned by Ouda et al (2022), are the most serious security concerns in cloud computing. Hence, awareness of the latest innovations in cloud security technologies is necessary in order to mitigate the risks of these security challenges and provide security solutions to remain competitive (Hassan et al, 2019).…”
Section: Introductionmentioning
confidence: 99%