IDEAS home Printed from https://ideas.repec.org/a/iaf/journl/y2023i4p97-104.html
   My bibliography  Save this article

Enterprise Data Security in the Cloud Environment: Threat Analysis

Author

Listed:
  • Tetiana Kapeliushna

    (State University of Information and Communication Technologies, Kyiv, Ukraine)

Abstract

Wider use of cloud services leads to increased cyber attacks on data arrays in cloud storage. Ensuring privacy in the cloud comes at a cost, and businesses are willing to bear these costs for data security. However, there is still a high risk of data being tracked and stolen due to existing vulnerabilities in the Internet environment. The purpose of the article is to analyze threats to data in the cloud environment under conditions of uncertainty and to reveal their increase in the virtual IT infrastructure of the enterprise. The advantages and disadvantages of enterprises using cloud services for data storage were revealed. Considering the amount of financial losses and reputational risks, the issue of protecting networks and services in the cloud, especially when hosting confidential or secret information, is a priority for enterprises of all industries. According to Significant Cyber Incidents, cyber incidents against government, defence and high-tech companies in the world were analyzed during 2021-2022. It was found that the attacks were primarily aimed at critical infrastructure enterprises and government organizations. Analysis of data from the Future Risk Report 2022 shows that climate change, geopolitical tensions, cyber security risks, and energy risks will remain the most significant risks over the next decade. It was revealed that since the beginning of the full-scale invasion, the number of attacks on Ukrainian enterprises of critical infrastructure and the telecommunications sphere has increased significantly. This shows that hacker attacks are one of the tools of hybrid warfare, capable of causing significant damage to the country's economy. The revealed trend in Ukraine confirms the predictions of international experts that cyber threats will grow in conditions of uncertainty and geopolitical instability. The article provides a chronology of massive cyberattacks on Ukrainian enterprises and organizations in the IT sphere over the past two years. It was determined that the means of reducing risks in the field of cyber security, which lead to the saving of costs of enterprises for data security, are the tools of artificial intelligence of security and further automation of threat identification. Thus, cyber security becomes an integral component in ensuring the full functioning of the enterprise, and the ways and means of its achievement require further research.

Suggested Citation

  • Tetiana Kapeliushna, 2023. "Enterprise Data Security in the Cloud Environment: Threat Analysis," Oblik i finansi, Institute of Accounting and Finance, issue 4, pages 97-104, December.
  • Handle: RePEc:iaf:journl:y:2023:i:4:p:97-104
    DOI: 10.33146/2307-9878-2023-4(102)-97-104
    as

    Download full text from publisher

    File URL: http://www.afj.org.ua/pdf/1030-bezpeka-danih-pidpriemstva-u-hmarnomu-seredovischi-analiz-zagroz.pdf
    Download Restriction: no

    File URL: http://www.afj.org.ua/en/article/1030/
    Download Restriction: no

    File URL: https://libkey.io/10.33146/2307-9878-2023-4(102)-97-104?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    enterprise security; uncertain conditions; cloud services security; virtual IT infrastructure; cyber incidents;
    All these keywords.

    JEL classification:

    • D81 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Criteria for Decision-Making under Risk and Uncertainty

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:iaf:journl:y:2023:i:4:p:97-104. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Serhiy Ostapchuk (email available below). General contact details of provider: https://edirc.repec.org/data/iafkvua.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.