DSpace Repository

A Descriptive Analysis of Security Threats and Attacks in Public Cloud Computing: Safeguarding Data from Cyber Attacks.

Show simple item record

dc.contributor.author Orucho, Daniel Okari
dc.contributor.author Katila, Charles
dc.contributor.author Mandela, Ngaira
dc.date.accessioned 2026-02-20T08:46:34Z
dc.date.available 2026-02-20T08:46:34Z
dc.date.issued 2025-08
dc.identifier.citation Orucho, D. O., Katila, C., & Mandela, N. (2025). A Descriptive Analysis of Security Threats and Attacks in Public Cloud Computing: Safeguarding Data from Cyber Attacks. environment, 6(8), 9. en_US
dc.identifier.issn 1947-5500
dc.identifier.uri https://repository.cuk.ac.ke/handle/123456789/1893
dc.description A research article published in the International Journal of Computer Science and Information Security (IJCSIS), en_US
dc.description.abstract Cloud computing has revolutionized how organizations and individuals store, access, and interact with data, software, and computing resources. Public cloud platforms offer scalable, cost-efficient, and globally accessible services, often characterized by managed infrastructure and multi-tenancy. However, this technological advancement faces escalating cyber threats and sophisticated attack vectors such as Denial-of-Service (DoS), Man-in-the-Middle (MITM) attacks, data breaches, and insecure APIs. These threats compromise data integrity, availability, and confidentiality. This study employs a descriptive research methodology, supplemented by desktop analysis, to examine the evolving landscape of security threats in public cloud computing. It further evaluates mitigation strategies including encryption, access control, secure API management, and continuous monitoring, while highlighting persistent research gaps that demand attention for robust cloud security frameworks. en_US
dc.language.iso en en_US
dc.publisher International Journal of Computer Science and Information Security en_US
dc.relation.ispartofseries Vol. 23;No. 4 (2025)
dc.title A Descriptive Analysis of Security Threats and Attacks in Public Cloud Computing: Safeguarding Data from Cyber Attacks. en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account