Cybersecurity Threats in Cloud Computing: A Study On Cloud-Based Security Solutions
DOI:
https://doi.org/10.63056/ACAD.004.04.1019Keywords:
Cloud computing, security threats, cloud security, IT security, industries, PakistanAbstract
This study explored cloud computing security threats and evaluated cloud security offered solutions in Pakistan. The study was based on a mixed-method study design. The quantitative component was extracted from 200 IT security experts employed in the banking, healthcare, education, and telecommunications industries, while the qualitative component was based on 25 cloud security professionals located in Karachi, Lahore, and Islamabad. Secondary data was information from the literature and cloud security related case studies in Pakistan from the years 2020 through 2024. The study investigated multiple models of cloud services and the common threats such as data breaches, account hijacking, distributed denial of service (DDoS) attacks, and issues of compliance in relation to the regulatory environment in Pakistan. The quantitative data which was analyzed through the use of the SPSS software, showed various threats and security measures to be implemented. The qualitative data provided contextual invaluable insights on security measures that could be employed given the available infrastructures. The results suggest that cloud security within Pakistan was the result of weak security policies, low cloud security awareness, and limited organizational resources. The study suggested the use of internationally accepted security standards, layered security systems, routine security checks, and user training as the best practices. This work highlights the security practices that Pakistan organizations need to consider while adopting cloud computing in order to counter the potential cyber threats.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nisar Ahmed Memon, Ziyad Abdullah, Sana Wajid (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.







