Cybersecurity Frameworks for Cloud Computing Environments

Elizabeth Shelly
{"title":"Cybersecurity Frameworks for Cloud Computing Environments","authors":"Elizabeth Shelly","doi":"10.47941/ijce.2058","DOIUrl":null,"url":null,"abstract":"Purpose: The general objective of this study was to explore cybersecurity frameworks for cloud computing environments. \nMethodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \nFindings: The findings reveal that there exists a contextual and methodological gap relating to explore cybersecurity frameworks for cloud computing environments. The study emphasized the necessity of robust, comprehensive security measures to address the unique challenges of cloud infrastructures. It highlighted the importance of advanced security measures like encryption, multi-factor authentication, and continuous monitoring to mitigate risks. The research underscored the need for holistic and adaptable frameworks that integrate technological solutions and human factors, while also stressing regulatory compliance. The findings had significant implications for cloud service providers, businesses, regulatory bodies, and cybersecurity professionals, suggesting a focus on new technologies like AI and blockchain for future research. \nUnique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (ATM) and Socio-Technical Systems Theory may be used to anchor future studies on cybersecurity frameworks for cloud computing environments. The study made significant theoretical, practical, and policy recommendations. It emphasized the need for an integrated theoretical approach, the adoption of multi-layered security practices, and regular security assessments. The study also advocated for standardized and specific regulatory frameworks tailored to cloud environments and international cooperation for consistent global cybersecurity policies. These recommendations aimed to enhance the understanding, implementation, and governance of cloud security, ultimately contributing to a more resilient and secure cloud computing ecosystem.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"50 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47941/ijce.2058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose: The general objective of this study was to explore cybersecurity frameworks for cloud computing environments. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to explore cybersecurity frameworks for cloud computing environments. The study emphasized the necessity of robust, comprehensive security measures to address the unique challenges of cloud infrastructures. It highlighted the importance of advanced security measures like encryption, multi-factor authentication, and continuous monitoring to mitigate risks. The research underscored the need for holistic and adaptable frameworks that integrate technological solutions and human factors, while also stressing regulatory compliance. The findings had significant implications for cloud service providers, businesses, regulatory bodies, and cybersecurity professionals, suggesting a focus on new technologies like AI and blockchain for future research. Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (ATM) and Socio-Technical Systems Theory may be used to anchor future studies on cybersecurity frameworks for cloud computing environments. The study made significant theoretical, practical, and policy recommendations. It emphasized the need for an integrated theoretical approach, the adoption of multi-layered security practices, and regular security assessments. The study also advocated for standardized and specific regulatory frameworks tailored to cloud environments and international cooperation for consistent global cybersecurity policies. These recommendations aimed to enhance the understanding, implementation, and governance of cloud security, ultimately contributing to a more resilient and secure cloud computing ecosystem.
云计算环境的网络安全框架
目的:本研究的总体目标是探索云计算环境的网络安全框架。研究方法:本研究采用桌面研究方法。桌面研究指的是二手数据或无需实地考察即可收集的数据。案头研究基本上是从现有资源中收集数据,因此与实地研究相比,案头研究通常被认为是一种低成本技术,因为主要成本涉及执行人员的时间、电话费和目录。因此,本研究依赖于已出版的研究、报告和统计数据。这些二手数据可通过在线期刊和图书馆轻松获取。研究结果:研究结果表明,在探索云计算环境的网络安全框架方面存在背景和方法上的差距。研究强调,有必要采取强大、全面的安全措施来应对云基础设施的独特挑战。它强调了加密、多因素身份验证和持续监控等先进安全措施对降低风险的重要性。研究强调,需要建立整合技术解决方案和人为因素的整体性、适应性框架,同时还要强调合规性。研究结果对云服务提供商、企业、监管机构和网络安全专业人员具有重要意义,建议今后的研究重点放在人工智能和区块链等新技术上。对理论、实践和政策的独特贡献:创新扩散理论、技术接受模型(ATM)和社会技术系统理论可用于未来云计算环境网络安全框架的研究。本研究提出了重要的理论、实践和政策建议。它强调了综合理论方法、采用多层次安全实践和定期安全评估的必要性。研究还提倡针对云环境制定标准化的具体监管框架,并开展国际合作,以制定一致的全球网络安全政策。这些建议旨在加强对云计算安全的理解、实施和管理,最终促进建立一个更有弹性、更安全的云计算生态系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信