An Investigation into the Vulnerabilities of Cloud Computing
Keywords:Privacy, Infrastructure, sniffing, cloud computing, service
The use of cloud technology is growing rapidly in various industries, especially during the current health crisis due to the widespread implementation of remote working by companies. This shift has resulted in successful data transfer to cloud systems, enabling effortless access and manipulation on any device with appropriate authorization, rendering the necessity for data storage on specific equipment redundant.
How to Cite
Tiwari, A. ., & Tripathi, V. . (2023). An Investigation into the Vulnerabilities of Cloud Computing. Journal of Online Engineering Education, 14(1s), 58–62. https://doi.org/10.52783/joee.v14i1s.88