Cyber Threats in Cloud Computing

Main Article Content

Ruksar Zakir Ansari
Devyani Bhondele
Munmun Puranik

Abstract

Cloud computing has become a fundamental component of modern IT infrastructure, offering scalability, flexibility, and cost efficiency. However, the rapid growth of cloud adoption has significantly increased exposure to cyber threats such as data breaches, ransomware, insecure APIs, misconfigurations, insider threats, and DDoS attacks. This study presents a comprehensive analysis of these threats using both secondary research and a primary survey conducted among IT students and professionals in Pune. The findings reveal that data breaches, ransomware, and misconfigurations are the most critical threats. The study also identifies key gaps such as low user awareness, weak identity management, and lack of monitoring. Practical solutions including Zero Trust Architecture, IAM, MFA, encryption, and continuous monitoring are proposed to enhance cloud security.


Cloud computing has become a fundamental component of modern IT infrastructure, offering scalability, flexibility, and cost efficiency. However, the rapid growth of cloud adoption has significantly increased exposure to cyber threats such as data breaches, ransomware, insecure APIs, misconfigurations, insider threats, and DDoS attacks. This study presents a comprehensive analysis of these threats using both secondary research and a primary survey conducted among IT students and professionals in Pune. The findings reveal that data breaches, ransomware, and misconfigurations are the most critical threats. The study also identifies key gaps such as low user awareness, weak identity management, and lack of monitoring. Practical solutions including Zero Trust Architecture, IAM, MFA, encryption, and continuous monitoring are proposed to enhance cloud security.


 

Article Details

How to Cite
Ansari, R. Z., Bhondele, D., & Puranik, M. (2026). Cyber Threats in Cloud Computing. International Journal on Advanced Computer Theory and Engineering, 15(2S), 266–272. Retrieved from https://journals.mriindia.com/index.php/ijacte/article/view/3007
Section
Articles

Similar Articles

<< < 8 9 10 11 12 13 14 15 16 17 > >> 

You may also start an advanced similarity search for this article.