Cybersecurity Analysis of Information Technology Infrastructure in the Era of Cloud Computing
DOI:
https://doi.org/10.64803/ikosstemi.v1.39Keywords:
Cybersecurity, Cloud Computing, Information Technology Infrastructure, Data Protection, Risk Management, Network SecurityAbstract
In the era of cloud computing, cybersecurity has become a critical concern for organizations relying on digital infrastructure. The rapid adoption of cloud-based systems offers scalability, flexibility, and efficiency, yet it simultaneously introduces complex security challenges such as data breaches, unauthorized access, and system vulnerabilities. This paper presents an analytical study of cybersecurity issues affecting information technology (IT) infrastructure in the cloud computing environment. The research explores potential threats, evaluates existing security frameworks, and discusses strategies for enhancing data protection and risk management. A mixed-method approach, combining literature review and case analysis, was employed to identify key factors influencing cloud security performance. The findings reveal that while cloud service providers implement robust security measures, human error, weak authentication mechanisms, and inadequate policy enforcement remain major risk factors. The study emphasizes the importance of adopting a multi-layered security model, integrating encryption, identity management, and continuous monitoring to ensure data integrity and confidentiality. In conclusion, maintaining cybersecurity in the cloud era requires a balance between technological innovation and organizational awareness. Strengthening cybersecurity resilience demands collaboration among stakeholders, continuous updates of security protocols, and the development of adaptive policies aligned with emerging threats.
References
Campolo, C., Genovese, G., Iera, A., & Molinaro, A. (2021). Virtualizing AI at the distributed edge towards intelligent IoT applications. Journal of Sensor and Actuator Networks, 10(1), 13.
Duffy, A., Browne, F., & Connolly, M. (2025). Safeguarding adults: A concept analysis. Journal of Advanced Nursing, 81(1), 181–197.
Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2022). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 62(3), 452–462.
Jayabalan, J., & Jeyanthi, N. (2022). Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing, 164, 152–167.
Klymenko, O., Kosenkov, O., Meisenbacher, S., Elahidoost, P., Mendez, D., & Matthes, F. (2022). Understanding the implementation of technical measures in the process of data privacy compliance: A qualitative study. Proceedings of the 16th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 261–271.
Martins, S. L., Cruz, F. M. da, Araújo, R. P. de, & Silva, C. M. R. da. (2024). Systematic literature review on security misconfigurations in web applications. International Journal of Computers and Applications, 46(10), 840–852.
Obiki-Osafiele, A. N., Efunniyi, C. P., Abhulimen, A. O., Osundare, O. S., Agu, E. E., Adeniran, I. A., & OneAdvanced, U. K. (2024). Theoretical models for enhancing operational efficiency through technology in Nigerian businesses. International Journal of Applied Research in Social Sciences, 6(8), 1969–1989.
Ridge, D., Bullock, L., Causer, H., Fisher, T., Hider, S., Kingstone, T., Gray, L., Riley, R., Smyth, N., & Silverwood, V. (2023). ‘Imposter participants’ in online qualitative research, a new and increasing threat to data integrity? Health Expectations: An International Journal of Public Participation in Health Care and Health Policy, 26(3), 941.
Saxena, D., & Singh, A. K. (2022). Auto-adaptive learning-based workload forecasting in dynamic cloud environment. International Journal of Computers and Applications, 44(6), 541–551.
Ussher-Eke, D. (2023). From Awareness to Action: Designing effective cybersecurity training programs. International Journal of Science and Research Archive, 16, 494–504.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Siti Khodijah, Nur Syifa’u Sitha, Raihan Syafawi (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.






