Authors :
Abraham Omatule Victor; Musa Martha Ozohu
Volume/Issue :
Volume 11 - 2026, Issue 1 - January
Google Scholar :
https://tinyurl.com/muthhzs7
Scribd :
https://tinyurl.com/56cdyhzu
DOI :
https://doi.org/10.38124/ijisrt/26jan1045
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
In order to make significant changes to their digital life, a large number of enterprises all around the world,
including those in Nigeria, are adopting cloud computing. In this paper, we investigate what other people have written and
what is happening in Nigeria in order to determine the most significant cybersecurity risks that are associated with cloud
environments, the factors that lead to cloud-related data breaches, the consequences of such breaches, and the strategies
that can be implemented to mitigate these risks while adhering to Nigeria's regulations and infrastructure. According to the
findings of the survey, the most common causes of security breaches are still human mistake, inadequate management of
identity and access, and inadequate management of configuration. In it, it is stated that the implementation of Zero Trust
security models, constant monitoring of the situation, training of employees, and strict adherence to national and
international data protection regulations are all components that can contribute to the improvement of cloud security
resilience.
Keywords :
Component; Cloud Computing, Cybersecurity, Data Breaches, Risk Management, Zero Trust, Identity And Access Management.
References :
- Alharkan, I., & Aslam, N. (2021). Risk factors and mitigation approaches in cloud computing: A comprehensive review. Journal of Cloud Computing, 10(3), 1–18.
- Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. Journal of Cloud Security, 4(1), 1–18.
- Adeniran, A., Oluwole, S., & Adeyemi, T. (2023). Cloud adoption practices and cybersecurity readiness in Nigerian organizations. African Journal of Information Systems, 15(2), 55–72.
- CISA. (2022). Analysis report: Capital One cloud misconfiguration breach. Cybersecurity and Infrastructure Security Agency.
- ENISA. (2023). ENISA threat landscape for cloud computing 2023. European Union Agency for Cybersecurity.
- Hashizume, K., Rosado, D., Fernández-Medina, E., & Fernández, E. (2022). An updated classification of security threats in cloud computing. Computers & Security, 113, 102–119.
- IBM Security. (2023). Cost of a Data Breach Report 2023. IBM Security.
- Ibrahim, U., & Salawu, R. (2022). Cloud security awareness and NDPR compliance among Nigerian enterprises. Nigerian Journal of Information Security, 8(1), 22–36.
- Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (SP 800-145). National Institute of Standards and Technology.
- NITDA. (2021). Nigeria cloud computing policy guidelines. National Information Technology Development Agency
- Subashini, S., & Kavitha, V. (2011). A survey on security issues in cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.
- Takahashi, Y., Sato, K., & Nakamura, T. (2023). Emerging security challenges in multi-cloud environments. Journal of Cybersecurity Research, 7(4), 45–62.
- Verizon. (2024). Data Breach Investigations Report 2024. Verizon Enterprise
In order to make significant changes to their digital life, a large number of enterprises all around the world,
including those in Nigeria, are adopting cloud computing. In this paper, we investigate what other people have written and
what is happening in Nigeria in order to determine the most significant cybersecurity risks that are associated with cloud
environments, the factors that lead to cloud-related data breaches, the consequences of such breaches, and the strategies
that can be implemented to mitigate these risks while adhering to Nigeria's regulations and infrastructure. According to the
findings of the survey, the most common causes of security breaches are still human mistake, inadequate management of
identity and access, and inadequate management of configuration. In it, it is stated that the implementation of Zero Trust
security models, constant monitoring of the situation, training of employees, and strict adherence to national and
international data protection regulations are all components that can contribute to the improvement of cloud security
resilience.
Keywords :
Component; Cloud Computing, Cybersecurity, Data Breaches, Risk Management, Zero Trust, Identity And Access Management.