Download this chapter (PDF)
The growing need for security protocols to work in the cloud

Cloud computing offers unprecedented scalability, flexibility, and cost efficiency; however, the widespread adoption of cloud services introduces significant cybersecurity challenges. These challenges stem from shared provider-user responsibilities, an expanded attack surface, reliance on third-party vendors, and a lack of transparency in software and hardware.

Additionally, AI integration complicates security and privacy concerns. Hybrid cloud setups require robust security practices, like zero-trust architectures, continuous monitoring, and strong encryption.

Impact

education

Education

  • Other ways of working with cloud computing technology evolve, such as switching between cloud providers and/or solutions, including addressing cybersecurity aspects. It is expected that the importance of data sovereignty and sovereignty in general will become more integrated into curricula.
  • Revisions in IT education curricula could help to address the critical skills of cybersecurity professionals.
Research

Research

  • Due to a shortage of cybersecurity professionals, a lack of skilled personnel can leave research environments exposed to cyber threats, potentially affecting the integrity of research workflows and outcomes. To mitigate this, cybersecurity awareness training for researchers could be investigated.
  • Shared responsibilities can lead to data breaches or loss, particularly if researchers are unaware of security protocols.
  • Researchers must navigate various regulations regarding data protection and privacy, which can be complicated by cloud environment.
Operations

Operations

  • As cloud adoption continues to rise, careful planning and enhanced security measures are essential for institutions to protect sensitive data, ensure compliance, and maintain resilience in an evolving threat landscape. There will also be a large impact due to (data) migrations and the associated steps, such as preparation, awareness, and costs. The adoption of open-source software (OSS) is also expected to increase.
  • While hybrid clouds offer flexibility, they necessitate advanced security practices, which may be challenging for some research institutions to implement effectively.
More info about Cybersecurity?
Visit surf.nl
Link SURF icoon