Cybersecurity Risks in Cloud Computing and Data Breaches: Implications and Mitigation Strategies for Nigerian Organizations


Authors : Abraham Omatule Victor; Musa Martha Ozohu

Volume/Issue : Volume 11 - 2026, Issue 1 - January


Google Scholar : https://tinyurl.com/muthhzs7

Scribd : https://tinyurl.com/56cdyhzu

DOI : https://doi.org/10.38124/ijisrt/26jan1045

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : In order to make significant changes to their digital life, a large number of enterprises all around the world, including those in Nigeria, are adopting cloud computing. In this paper, we investigate what other people have written and what is happening in Nigeria in order to determine the most significant cybersecurity risks that are associated with cloud environments, the factors that lead to cloud-related data breaches, the consequences of such breaches, and the strategies that can be implemented to mitigate these risks while adhering to Nigeria's regulations and infrastructure. According to the findings of the survey, the most common causes of security breaches are still human mistake, inadequate management of identity and access, and inadequate management of configuration. In it, it is stated that the implementation of Zero Trust security models, constant monitoring of the situation, training of employees, and strict adherence to national and international data protection regulations are all components that can contribute to the improvement of cloud security resilience.

Keywords : Component; Cloud Computing, Cybersecurity, Data Breaches, Risk Management, Zero Trust, Identity And Access Management.

References :

  1. Alharkan, I., & Aslam, N. (2021). Risk factors and mitigation approaches in cloud computing: A comprehensive review. Journal of Cloud Computing, 10(3), 1–18.
  2. Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. Journal of Cloud Security, 4(1), 1–18.
  3. Adeniran, A., Oluwole, S., & Adeyemi, T. (2023). Cloud adoption practices and cybersecurity readiness in Nigerian organizations. African Journal of Information Systems, 15(2), 55–72.
  4. CISA. (2022). Analysis report: Capital One cloud misconfiguration breach. Cybersecurity and Infrastructure Security Agency.
  5. ENISA. (2023). ENISA threat landscape for cloud computing 2023. European Union Agency for Cybersecurity.
  6. Hashizume, K., Rosado, D., Fernández-Medina, E., & Fernández, E. (2022). An updated classification of security threats in cloud computing. Computers & Security, 113, 102–119.
  7. IBM Security. (2023). Cost of a Data Breach Report 2023. IBM Security.
  8. Ibrahim, U., & Salawu, R. (2022). Cloud security awareness and NDPR compliance among Nigerian enterprises. Nigerian Journal of Information Security, 8(1), 22–36.
  9. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (SP 800-145). National Institute of Standards and Technology.
  10. NITDA. (2021). Nigeria cloud computing policy guidelines. National Information Technology Development Agency
  11. Subashini, S., & Kavitha, V. (2011). A survey on security issues in cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.
  12. Takahashi, Y., Sato, K., & Nakamura, T. (2023). Emerging security challenges in multi-cloud environments. Journal of Cybersecurity Research, 7(4), 45–62.
  13. Verizon. (2024). Data Breach Investigations Report 2024. Verizon Enterprise

In order to make significant changes to their digital life, a large number of enterprises all around the world, including those in Nigeria, are adopting cloud computing. In this paper, we investigate what other people have written and what is happening in Nigeria in order to determine the most significant cybersecurity risks that are associated with cloud environments, the factors that lead to cloud-related data breaches, the consequences of such breaches, and the strategies that can be implemented to mitigate these risks while adhering to Nigeria's regulations and infrastructure. According to the findings of the survey, the most common causes of security breaches are still human mistake, inadequate management of identity and access, and inadequate management of configuration. In it, it is stated that the implementation of Zero Trust security models, constant monitoring of the situation, training of employees, and strict adherence to national and international data protection regulations are all components that can contribute to the improvement of cloud security resilience.

Keywords : Component; Cloud Computing, Cybersecurity, Data Breaches, Risk Management, Zero Trust, Identity And Access Management.

Paper Submission Last Date
28 - February - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe