Cybersecurity Analysis of Information Technology Infrastructure in the Era of Cloud Computing

Penulis

  • Siti Khodijah Universitas Pembangunan Panca Budi Author
  • Nur Syifa’u Sitha Universitas Pembangunan Panca Budi Author
  • Raihan Syafawi Universitas Pembangunan Panca Budi Author

DOI:

https://doi.org/10.64803/ikosstemi.v1.39
   

Kata Kunci:

Cybersecurity, Cloud Computing, Information Technology Infrastructure, Data Protection, Risk Management, Network Security

Abstrak

In the era of cloud computing, cybersecurity has become a critical concern for organizations relying on digital infrastructure. The rapid adoption of cloud-based systems offers scalability, flexibility, and efficiency, yet it simultaneously introduces complex security challenges such as data breaches, unauthorized access, and system vulnerabilities. This paper presents an analytical study of cybersecurity issues affecting information technology (IT) infrastructure in the cloud computing environment. The research explores potential threats, evaluates existing security frameworks, and discusses strategies for enhancing data protection and risk management. A mixed-method approach, combining literature review and case analysis, was employed to identify key factors influencing cloud security performance. The findings reveal that while cloud service providers implement robust security measures, human error, weak authentication mechanisms, and inadequate policy enforcement remain major risk factors. The study emphasizes the importance of adopting a multi-layered security model, integrating encryption, identity management, and continuous monitoring to ensure data integrity and confidentiality. In conclusion, maintaining cybersecurity in the cloud era requires a balance between technological innovation and organizational awareness. Strengthening cybersecurity resilience demands collaboration among stakeholders, continuous updates of security protocols, and the development of adaptive policies aligned with emerging threats.

Referensi

Campolo, C., Genovese, G., Iera, A., & Molinaro, A. (2021). Virtualizing AI at the distributed edge towards intelligent IoT applications. Journal of Sensor and Actuator Networks, 10(1), 13.

Duffy, A., Browne, F., & Connolly, M. (2025). Safeguarding adults: A concept analysis. Journal of Advanced Nursing, 81(1), 181–197.

Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2022). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 62(3), 452–462.

Jayabalan, J., & Jeyanthi, N. (2022). Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing, 164, 152–167.

Klymenko, O., Kosenkov, O., Meisenbacher, S., Elahidoost, P., Mendez, D., & Matthes, F. (2022). Understanding the implementation of technical measures in the process of data privacy compliance: A qualitative study. Proceedings of the 16th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 261–271.

Martins, S. L., Cruz, F. M. da, Araújo, R. P. de, & Silva, C. M. R. da. (2024). Systematic literature review on security misconfigurations in web applications. International Journal of Computers and Applications, 46(10), 840–852.

Obiki-Osafiele, A. N., Efunniyi, C. P., Abhulimen, A. O., Osundare, O. S., Agu, E. E., Adeniran, I. A., & OneAdvanced, U. K. (2024). Theoretical models for enhancing operational efficiency through technology in Nigerian businesses. International Journal of Applied Research in Social Sciences, 6(8), 1969–1989.

Ridge, D., Bullock, L., Causer, H., Fisher, T., Hider, S., Kingstone, T., Gray, L., Riley, R., Smyth, N., & Silverwood, V. (2023). ‘Imposter participants’ in online qualitative research, a new and increasing threat to data integrity? Health Expectations: An International Journal of Public Participation in Health Care and Health Policy, 26(3), 941.

Saxena, D., & Singh, A. K. (2022). Auto-adaptive learning-based workload forecasting in dynamic cloud environment. International Journal of Computers and Applications, 44(6), 541–551.

Ussher-Eke, D. (2023). From Awareness to Action: Designing effective cybersecurity training programs. International Journal of Science and Research Archive, 16, 494–504.

Diterbitkan

2025-11-03

Terbitan

Bagian

Articles

Cara Mengutip

Cybersecurity Analysis of Information Technology Infrastructure in the Era of Cloud Computing. (2025). Prosiding Seminar Nasional Ilmu Komputer, Sosial Sains, Teknik Dan Multi-Disiplin Ilmu, 1, 15-19. https://doi.org/10.64803/ikosstemi.v1.39