Safeguarding The Cloud Frontier

Authors

  • Dr. Ashish Tiwari Associate professor, Dept. of CSE, Amity University, lucknow, India. Author
  • Tushar UG Scholar, Dept. of CSE, Amity School of Engineering & Technology, India. Author
  • Alhamd Khan UG Scholar, Dept. of CSE, Amity School of Engineering & Technology, India. Author
  • Nitish kumar UG Scholar, Dept. of CSE, Amity School of Engineering & Technology, India. Author

DOI:

https://doi.org/10.47392/IRJAEH.2025.0409

Keywords:

Cloud Security, Cyber Threats, Data Protection, Identity and Access Management, Compliance, Security Automation, Continuous Monitoring, Risk Mitigation, Cloud Vulnerabilities, Threat Detection

Abstract

In today's cloud-centric environment, organizations face a growing array of security challenges that threaten data integrity, privacy, and compliance. This study explores the critical security risks associated with cloud computing, including data breaches, identity and access vulnerabilities, misconfigurations, and advanced cyber threats. It examines existing security frameworks, mitigation strategies, and best practices aimed at strengthening cloud security. Additionally, the paper emphasizes the importance of automation, continuous monitoring, and proactive risk management in addressing these challenges. By analyzing the evolving threat landscape, this research provides valuable insights into current security concerns and potential future advancements in cloud security.

Downloads

Download data is not yet available.

Downloads

Published

2025-06-04

How to Cite

Safeguarding The Cloud Frontier. (2025). International Research Journal on Advanced Engineering Hub (IRJAEH), 3(06), 2771-2778. https://doi.org/10.47392/IRJAEH.2025.0409

Similar Articles

1-10 of 585

You may also start an advanced similarity search for this article.