Cybersecurity Threats in Cloud Computing: A Study On Cloud-Based Security Solutions

Authors

  • Nisar Ahmed Memon Assistant Professor, Department of Telecommunication Engineering, Faculty of Engineering and Technology, University of Sindh Jamshoro Author
  • Ziyad Abdullah Computers and networks engineering University of Hertfordshire United Kingdom Author
  • Sana Wajid Software Engineer, Interior Ministry of Pakistan Author

DOI:

https://doi.org/10.63056/ACAD.004.04.1019

Keywords:

Cloud computing, security threats, cloud security, IT security, industries, Pakistan

Abstract

This study explored cloud computing security threats and evaluated cloud security offered solutions in Pakistan. The study was based on a mixed-method study design. The quantitative component was extracted from 200 IT security experts employed in the banking, healthcare, education, and telecommunications industries, while the qualitative component was based on 25 cloud security professionals located in Karachi, Lahore, and Islamabad. Secondary data was information from the literature and cloud security related case studies in Pakistan from the years 2020 through 2024. The study investigated multiple models of cloud services and the common threats such as data breaches, account hijacking, distributed denial of service (DDoS) attacks, and issues of compliance in relation to the regulatory environment in Pakistan. The quantitative data which was analyzed through the use of the SPSS software, showed various threats and security measures to be implemented. The qualitative data provided contextual invaluable insights on security measures that could be employed given the available infrastructures. The results suggest that cloud security within Pakistan was the result of weak security policies, low cloud security awareness, and limited organizational resources. The study suggested the use of internationally accepted security standards, layered security systems, routine security checks, and user training as the best practices. This work highlights the security practices that Pakistan organizations need to consider while adopting cloud computing in order to counter the potential cyber threats.

Downloads

Published

2025-11-02

How to Cite

Memon, N. A. ., Abdullah, Z. ., & Wajid, S. . (2025). Cybersecurity Threats in Cloud Computing: A Study On Cloud-Based Security Solutions. ACADEMIA International Journal for Social Sciences, 4(4), 1639-1650. https://doi.org/10.63056/ACAD.004.04.1019