Security attacks in cloud computing

Abstract

This thesis discusses the major types of cybersecurity attacks. In particular, it discusses the essential process, needs, and a secure protocol that can be easily understood by beginners or those who are interested in using cloud computing as their daily services to counter potential network threats. The thesis deliberates the concept of network vulnerabilities for the early prevention from attack and suggests few mitigation techniques. The information provided in the given thesis has been amassed with a thorough secondary data collection and research techniques that demonstrated the majority of technologically dependent corporations and security experts who are aware of the potential cybersecurity threats. The conclusion of this thesis conveys ideas on different types of potential threats to cloud computing services based on data collected during 2020. The open data published in 2020 can be used by the reader to understand the potential cybersecurity threats and current trends in order to apply strategies for countermeasures in the coming future

    Similar works

    Full text

    thumbnail-image

    Available Versions