Cybersecurity and Cyber Attacks in Cloud Infrastructure
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 219 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science and Information Technology | United States of America | Volume 12 Issue 4, April 2023 | Popularity: 5 / 10


     

Cybersecurity and Cyber Attacks in Cloud Infrastructure

Naga Satya Praveen Kumar Yadati


Abstract: The increasing adoption of cloud infrastructure by businesses and individuals has introduced numerous cybersecurity challenges. Cloud environments offer unparalleled flexibility and scalability, but they also expose systems to sophisticated cyber attacks. This paper explores the landscape of cybersecurity in cloud infrastructure, detailing common attack vectors, vulnerabilities, and mitigation strategies. By analyzing current trends and case studies, this paper aims to provide a comprehensive understanding of the threats faced by cloud infrastructure and the methods employed to secure these environments.


Keywords: Cybersecurity, Cloud Infrastructure, Cyber Attacks, Cloud Security, Attack Vectors, Data Breaches, Vulnerabilities, Mitigation Strategies


Edition: Volume 12 Issue 4, April 2023


Pages: 1915 - 1920


DOI: https://www.doi.org/10.21275/SR24628043205



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Naga Satya Praveen Kumar Yadati, "Cybersecurity and Cyber Attacks in Cloud Infrastructure", International Journal of Science and Research (IJSR), Volume 12 Issue 4, April 2023, pp. 1915-1920, https://www.ijsr.net/getabstract.php?paperid=SR24628043205, DOI: https://www.doi.org/10.21275/SR24628043205

Similar Articles

Downloads: 0

Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019

Pages: 2454 - 2456

Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools

Satheesh Reddy Gopireddy

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 1826 - 1831

Automated Penetration Testing using Large Language Models

Dhananjai Sharma, Shria Verma

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 7, July 2024

Pages: 1190 - 1194

Serverless Security: Best Practices for Protecting Functions-as-a-Service

Yamini Kannan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, Nepal, Volume 11 Issue 1, January 2022

Pages: 613 - 618

Cyber Security, Big Challenges in Nepal and E-Governance

Dr. Shailendra Giri, Resham Giri

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Computer Science and Information Technology, India, Volume 13 Issue 1, January 2024

Pages: 177 - 182

Ethical Hacking: Vulnerabilities & Dangers

Chanda Prasad, Dr. Binod Kumar

Share this Article
Top