SlideShare a Scribd company logo
1 of 7
Course : Virtualization and Cloud Computing
Course Code : CSE423
Presented by :
Rishi Sharma, 12003011
A REVIEW OF THE SECURITY ISSUES IN CLOUD
COMPUTING AND ITS REMEDIAL ACTIONS
Introduction-
Cloud computing has changed the way organizations manage data by storing it on
remote servers, leading to cost savings and better accessibility. However, security
concerns have arisen due to the increasing reliance on cloud computing. This
presentation examines various security issues in cloud computing.
And suggests measures to improve security and privacy. It also emphasizes the
importance of addressing security concerns to protect the privacy, integrity, and
availability of organizational data.
Security Risks in Cloud Computing
There are multiple security threats that can negatively affect the
organization’s data. Below are some of the most prevalent security risks
associated with cloud computing:
 Data Breaches
 Insider Threats
 Third Party Risks
Data Breaches :- A data breach in cloud computing refers to the unauthorized access of sensitive
information stored in a cloud-based system. It can occur due to various reasons, such as weak
passwords, inadequate encryption, or human error. The consequences of a data breach can be
severe, including financial loss, damage to reputation, and legal consequences.
Insider Threats:- It refers to the risks posed by employees, contractors, or other insiders who have
authorized access to a cloud-based system. These insiders can intentionally or unintentionally misuse
their privileges and compromise sensitive data stored in the cloud. Examples of insider threats in
cloud computing include employees accessing data outside their job responsibilities, sharing login
credentials with unauthorized individuals, etc
Third-party risks :- It refers to the security risks that arise due to the involvement of third-party
service providers, such as cloud hosting providers or software vendors. The security of the cloud-
based system depends on the security practices of these third-party providers. If the providers are
not following adequate security measures, it can compromise the security of the entire system.
Remedial Actions
Organizations can take several remedial actions to abate security issues in cloud
computing. The following are some of the most effective remedial actions:
 Encryption
 Access Controls
 Regular Audits
 Disaster Recovery
Encryption:- Data encryption in cloud computing refers to the process of converting plain text data
into an unreadable format using cryptographic algorithms. It is an essential security measure that
helps protect sensitive data stored in the cloud from unauthorized access like
encrypting sensitive financial data such as credit card numbers.
Access Controls:- Access controls in cloud computing refer to the methods used to manage and
restrict access to cloud-based resources, applications, and data. Access controls ensure that only
authorized users can access the resources and perform specific actions, thereby reducing the risk
of data breaches and insider threats.
Regular Audits:- Regular audits in cloud computing refer to the periodic assessments of cloud-
based systems to ensure compliance with security policies and regulations. Audits help identify
security vulnerabilities, ensure proper access controls and encryption, and assess the
effectiveness of disaster recovery plans.
Disaster Recovery:- It refers to the process of restoring the availability and functionality of cloud-based
systems in the event of a natural or human-made disaster. Cloud-based disaster recovery solutions offer
improved scalability, reliability, and cost-effectiveness compared to traditional disaster recovery methods.
Conclusion
Cloud computing is a popular way for organizations to store and manage data,
but it also presents new security challenges. The security risks such as data
breaches, insider threats, and third-party risks can compromise sensitive
information. To address these issues, organizations must implement security
measures.
Failing to address these concerns can lead to severe consequences, including the
loss of privacy of integrity of data. Therefore, it is crucial for organizations to
prioritize security measures in cloud computing to keep their data safe.

More Related Content

Similar to Security issues in cloud computing.pptx

All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...Skyline IT Management
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxLokNathRegmi1
 
The Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxThe Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxBluechip Gulf IT Services
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Top three tips in ensuring security and compliance in cloud computing
Top three tips in ensuring security and compliance in cloud computingTop three tips in ensuring security and compliance in cloud computing
Top three tips in ensuring security and compliance in cloud computingOsazeeOboh
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET Journal
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfForgeahead Solutions
 
Is Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxIs Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxTiInfotech
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 

Similar to Security issues in cloud computing.pptx (20)

All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
The Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxThe Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptx
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Top three tips in ensuring security and compliance in cloud computing
Top three tips in ensuring security and compliance in cloud computingTop three tips in ensuring security and compliance in cloud computing
Top three tips in ensuring security and compliance in cloud computing
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Is Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxIs Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docx
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Security issues in cloud computing.pptx

  • 1. Course : Virtualization and Cloud Computing Course Code : CSE423 Presented by : Rishi Sharma, 12003011 A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTIONS
  • 2. Introduction- Cloud computing has changed the way organizations manage data by storing it on remote servers, leading to cost savings and better accessibility. However, security concerns have arisen due to the increasing reliance on cloud computing. This presentation examines various security issues in cloud computing. And suggests measures to improve security and privacy. It also emphasizes the importance of addressing security concerns to protect the privacy, integrity, and availability of organizational data.
  • 3. Security Risks in Cloud Computing There are multiple security threats that can negatively affect the organization’s data. Below are some of the most prevalent security risks associated with cloud computing:  Data Breaches  Insider Threats  Third Party Risks
  • 4. Data Breaches :- A data breach in cloud computing refers to the unauthorized access of sensitive information stored in a cloud-based system. It can occur due to various reasons, such as weak passwords, inadequate encryption, or human error. The consequences of a data breach can be severe, including financial loss, damage to reputation, and legal consequences. Insider Threats:- It refers to the risks posed by employees, contractors, or other insiders who have authorized access to a cloud-based system. These insiders can intentionally or unintentionally misuse their privileges and compromise sensitive data stored in the cloud. Examples of insider threats in cloud computing include employees accessing data outside their job responsibilities, sharing login credentials with unauthorized individuals, etc Third-party risks :- It refers to the security risks that arise due to the involvement of third-party service providers, such as cloud hosting providers or software vendors. The security of the cloud- based system depends on the security practices of these third-party providers. If the providers are not following adequate security measures, it can compromise the security of the entire system.
  • 5. Remedial Actions Organizations can take several remedial actions to abate security issues in cloud computing. The following are some of the most effective remedial actions:  Encryption  Access Controls  Regular Audits  Disaster Recovery
  • 6. Encryption:- Data encryption in cloud computing refers to the process of converting plain text data into an unreadable format using cryptographic algorithms. It is an essential security measure that helps protect sensitive data stored in the cloud from unauthorized access like encrypting sensitive financial data such as credit card numbers. Access Controls:- Access controls in cloud computing refer to the methods used to manage and restrict access to cloud-based resources, applications, and data. Access controls ensure that only authorized users can access the resources and perform specific actions, thereby reducing the risk of data breaches and insider threats. Regular Audits:- Regular audits in cloud computing refer to the periodic assessments of cloud- based systems to ensure compliance with security policies and regulations. Audits help identify security vulnerabilities, ensure proper access controls and encryption, and assess the effectiveness of disaster recovery plans. Disaster Recovery:- It refers to the process of restoring the availability and functionality of cloud-based systems in the event of a natural or human-made disaster. Cloud-based disaster recovery solutions offer improved scalability, reliability, and cost-effectiveness compared to traditional disaster recovery methods.
  • 7. Conclusion Cloud computing is a popular way for organizations to store and manage data, but it also presents new security challenges. The security risks such as data breaches, insider threats, and third-party risks can compromise sensitive information. To address these issues, organizations must implement security measures. Failing to address these concerns can lead to severe consequences, including the loss of privacy of integrity of data. Therefore, it is crucial for organizations to prioritize security measures in cloud computing to keep their data safe.