
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 3
July-September 2025
Indexing Partners



















Threats and Vulnerabilities in Cloud Computing: A Comprehensive Security Analysis
Author(s) | Dr. Dipak V Bhavsagar |
---|---|
Country | India |
Abstract | Cloud computing remains a cornerstone of modern IT infrastructure in 2025, yet it is plagued by persistent and evolving security issues. This review synthesizes recent data from sources like the Cloud Security Alliance (CSA) Top Threats 2025 report, IBM's Cost of a Data Breach 2025, and various industry analyses, highlighting threats such as misconfigurations, data breaches, API vulnerabilities, and AI-driven attacks. Key statistics reveal that 82% of breaches involve cloud data, with human error accounting for 82% of misconfigurations, leading to an average global breach cost of $4.45 million. Through data analysis, including growth rates and sector-specific impacts, this paper examines vulnerabilities, real-world incidents, mitigation strategies, and future trends. Visual aids, tables, and charts illustrate the escalating threat landscape, emphasizing the need for proactive, AI-enhanced defenses. |
Keywords | Cloud computing, security, vulnerabilities, threats, Business Computing, Future Trends |
Field | Computer > Network / Security |
Published In | Volume 16, Issue 3, July-September 2025 |
Published On | 2025-08-22 |
DOI | https://doi.org/10.71097/IJSAT.v16.i3.7823 |
Short DOI | https://doi.org/g9x3zw |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
