Cyber Resilience, Risk Management, and Security Challenges in Enterprise-Scale Cloud Systems: Comprehensive Review

被引:1
|
作者
Abdi, Abdiaziz [1 ]
Bennouri, Hajar [2 ]
Keane, Anthony [1 ]
机构
[1] Technol Univ, Sch Informat & Cyber Secur, Dublin, Ireland
[2] Technol Univ, Collab, Dublin, Ireland
关键词
Cyber Resilience; Risk Management; Security; Cloud Systems; Vulnerabilities;
D O I
10.1109/MECO62516.2024.10577956
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cyberthreat landscape is constantly evolving with the rapid development of cloud computing. Today, businesses and consumers rely heavily on cloud infrastructure, which provides high availability and resilient systems. However, cloud and IoT platforms contain vulnerabilities that can compromise data confidentiality, integrity, and availability, leading to disruptions in service operations. These significant challenges pose serious threats such as vulnerabilities, misconfigurations, data breaches, faulty hardware, and application failures with high costs. IBM reports that the average cost of a data breach worldwide is approximately US$4.5 million per incident. This highlights the need for adequately designed resilience systems with high availability and fault tolerance. This paper examines the relationship between resilience and failure in enterprise cloud systems caused by cyberattacks. The metrics for measuring exposure and risk in the cloud and IoT and present quantifiable metrics to assess vulnerability and risk. Additionally, we explore various approaches to mitigate risk and enhance resilience. This study highlights significant research findings that can aid in better understanding this research challenge
引用
收藏
页码:132 / 139
页数:8
相关论文
共 50 条
  • [21] A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security
    Tatipatri, Naveen
    Arun, S. L.
    IEEE ACCESS, 2024, 12 : 18147 - 18167
  • [22] 2nd Workshop on Cyber Security and Resilience of Large-Scale Systems
    Ficco, Massimo
    D'Antonio, Salvatore
    INTELLIGENT DISTRIBUTED COMPUTING IX, IDC'2015, 2016, 616 : 401 - 401
  • [23] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [24] Enterprise architecture to enhance security and risk management of information systems
    School of Software, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2073-2086):
  • [25] The measurements and performance of enterprise risk management: a comprehensive literature review
    Horvey, Sylvester Senyo
    Odei-Mensah, Jones
    JOURNAL OF RISK RESEARCH, 2023, 26 (07) : 778 - 800
  • [26] Homeland and Cyber Security Challenges: The Importance of Collaborative Risk Management and Emergency Preparedness
    Alkins, Stephen
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (4TH), VOL I, 2008, : 147 - 161
  • [27] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [28] A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
    Mohan, Athira M.
    Meskin, Nader
    Mehrjerdi, Hasan
    ENERGIES, 2020, 13 (15)
  • [29] On the resilience of modern power systems: A comprehensive review from the cyber-physical perspective
    Xu, Luo
    Guo, Qinglai
    Sheng, Yujie
    Muyeen, S. M.
    Sun, Hongbin
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2021, 152
  • [30] A Comprehensive Review of Key Cyber-Physical Systems, and Assessment of Their Education Challenges
    Kocsis, Imre
    Burjan-Mosoni, Boglarka
    Balajti, Istvan
    IEEE ACCESS, 2025, 13 : 8898 - 8911