| dc.contributor.author | Orucho, Daniel Okari | |
| dc.contributor.author | Katila, Charles | |
| dc.contributor.author | Mandela, Ngaira | |
| dc.date.accessioned | 2026-02-20T08:46:34Z | |
| dc.date.available | 2026-02-20T08:46:34Z | |
| dc.date.issued | 2025-08 | |
| dc.identifier.citation | Orucho, D. O., Katila, C., & Mandela, N. (2025). A Descriptive Analysis of Security Threats and Attacks in Public Cloud Computing: Safeguarding Data from Cyber Attacks. environment, 6(8), 9. | en_US |
| dc.identifier.issn | 1947-5500 | |
| dc.identifier.uri | https://repository.cuk.ac.ke/handle/123456789/1893 | |
| dc.description | A research article published in the International Journal of Computer Science and Information Security (IJCSIS), | en_US |
| dc.description.abstract | Cloud computing has revolutionized how organizations and individuals store, access, and interact with data, software, and computing resources. Public cloud platforms offer scalable, cost-efficient, and globally accessible services, often characterized by managed infrastructure and multi-tenancy. However, this technological advancement faces escalating cyber threats and sophisticated attack vectors such as Denial-of-Service (DoS), Man-in-the-Middle (MITM) attacks, data breaches, and insecure APIs. These threats compromise data integrity, availability, and confidentiality. This study employs a descriptive research methodology, supplemented by desktop analysis, to examine the evolving landscape of security threats in public cloud computing. It further evaluates mitigation strategies including encryption, access control, secure API management, and continuous monitoring, while highlighting persistent research gaps that demand attention for robust cloud security frameworks. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | International Journal of Computer Science and Information Security | en_US |
| dc.relation.ispartofseries | Vol. 23;No. 4 (2025) | |
| dc.title | A Descriptive Analysis of Security Threats and Attacks in Public Cloud Computing: Safeguarding Data from Cyber Attacks. | en_US |
| dc.type | Article | en_US |