
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 1
January-February 2025
Indexing Partners



















Cloud Security Best Practices: Strategic Measures to Protect Digital Assets Within the Cloud
Author(s) | Richard Aggrey, Afeti Cudjoe, Karl Osei Afoduo, Bright Ansah Adjei, Nana Adwoa Konadu Dsane, Jessica Eyeson |
---|---|
Country | Ghana |
Abstract | This paper intends to explore the key features of cloud security, highlighting core practices and strategies in data and application protection within cloud setups. First, it explains cloud computing and the different types of services - service models and deployment models. It subsequently centres on cloud security, detailing the potential risks and threats that could occur, including data breaches and account hijacking. The paper also covers fundamental security practices to reduce these risks, such as data encryption and access control. Thus, to establish the security of information saved on a network during the process of transmission, data encryption must be carried out. In the same vein, user management methods such as Role-Based Access Control (RBAC) and multifactor authentication must be enabled and enforced to minimise access to sensitive information and systems. The need to protect cloud applications is also addressed, emphasising the importance of application security testing and container security. Therefore, each stage of the application development lifecycle can be secured, reducing vulnerabilities and the potential for attacks. Finally, the paper includes a discussion on cloud security compliance and regulation. Organisations must adhere to specific standards and regulations to secure sensitive data and meet the various requirements. By fulfilling these requirements, organisations can avoid legal and reputational risks. |
Field | Computer > Data / Information |
Published In | Volume 7, Issue 1, January-February 2025 |
Published On | 2025-01-16 |
Cite This | Cloud Security Best Practices: Strategic Measures to Protect Digital Assets Within the Cloud - Richard Aggrey, Afeti Cudjoe, Karl Osei Afoduo, Bright Ansah Adjei, Nana Adwoa Konadu Dsane, Jessica Eyeson - IJFMR Volume 7, Issue 1, January-February 2025. DOI 10.36948/ijfmr.2025.v07i01.35156 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i01.35156 |
Short DOI | https://doi.org/g82grn |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
