Journal Browser
Open Access Journal Article

Adaptive Cybersecurity Frameworks for Cloud Computing Environments

by Emily Taylor 1,*
1
Emily Taylor
*
Author to whom correspondence should be addressed.
Received: 24 June 2019 / Accepted: 23 July 2019 / Published Online: 30 August 2019

Abstract

The rapid advancement of cloud computing has revolutionized the way businesses and organizations operate, offering unprecedented scalability and flexibility. However, this shift to cloud environments has also introduced new cybersecurity challenges that require robust and adaptive framework solutions. This paper explores the importance of adaptive cybersecurity frameworks in cloud computing environments and their role in mitigating risks associated with data breaches, unauthorized access, and service disruptions. We discuss the necessity for frameworks that can evolve with the dynamic nature of cloud services, incorporating advanced threat intelligence, automated detection systems, and continuous monitoring. Furthermore, we delve into the integration of machine learning and artificial intelligence algorithms to enhance predictive capabilities, ensuring that cybersecurity measures are proactive rather than reactive. Finally, we highlight the importance of compliance with industry standards and regulations to guarantee the security and integrity of cloud-based services.


Copyright: © 2019 by Taylor. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) (Creative Commons Attribution 4.0 International License). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

Share and Cite

ACS Style
Taylor, E. Adaptive Cybersecurity Frameworks for Cloud Computing Environments. Information Sciences and Technological Innovations, 2019, 1, 1. https://doi.org/10.69610/j.isti.20190830
AMA Style
Taylor E. Adaptive Cybersecurity Frameworks for Cloud Computing Environments. Information Sciences and Technological Innovations; 2019, 1(1):1. https://doi.org/10.69610/j.isti.20190830
Chicago/Turabian Style
Taylor, Emily 2019. "Adaptive Cybersecurity Frameworks for Cloud Computing Environments" Information Sciences and Technological Innovations 1, no.1:1. https://doi.org/10.69610/j.isti.20190830
APA style
Taylor, E. (2019). Adaptive Cybersecurity Frameworks for Cloud Computing Environments. Information Sciences and Technological Innovations, 1(1), 1. https://doi.org/10.69610/j.isti.20190830

Article Metrics

Article Access Statistics

References

  1. Burbules, N. C., & Callister, T. A. (2000). Watch IT: The Risks and Promises of Information Technologies for Education. Westview Press.
  2. Cloud Security Alliance. (2014). Top Threats to Cloud Computing.
  3. Wang, Y., Li, X., & Li, H. (2013). Security in Cloud Computing: Challenges, Opportunities, and Solutions. International Journal of Security and Its Applications, 7(1), 1-14.
  4. CSIS. (2016). The Economics of Cybersecurity in the Post-Snowden Era.
  5. NIST. (2016). NIST Cloud Computing Security Reference Architecture.
  6. Cloud Security Alliance. (2015). Cloud Controls Matrix.
  7. Anupama, N., & Mahadevan, S. (2013). A Review on Cloud Computing Security Issues and Challenges. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), 986-993.
  8. Feamster, N., Jackson, J., & Pottie, G. (2014). The Role of Industry Standards in Cloud Computing Security. IEEE Security & Privacy, 12(3), 78-81.
  9. Wang, L., Wang, Y., & Li, X. (2014). Cloud security: A survey. ACM Computing Surveys (CSUR), 46(3), 1-35.
  10. Wang, F., & Wang, Y. (2015). A Survey on Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, 17(4), 2616-2651.
  11. Schramm, M., & Grawe, D. (2017). The Impact of GDPR on Cloud Computing. In 2017 IEEE International Conference on Cloud Engineering (IC2E) (pp. 1-4).
  12. Health Insurance Portability and Accountability Act (HIPAA) of 1996.