DEVELOPING AND DELIVERING COMPREHENSIVE CLOUD SECURITY TRAINING PROGRAMS: THE IMPORTANCE OF CONTINUOUS EDUCATION IN MAINTAINING HIGH LEVELS OF SECURITY AWARENESS

Authors

  • Wasif Khan USA Author

Keywords:

Cloud Security, Cloud Security Training, Shared Responsibility Model, Continuous Education, AI, Security Awareness, Role-Specific Training, Incident Response, Cybersecurity Training

Abstract

With organizations' growing reliance on cloud infrastructure, it becomes critical to ensure that cloud security is vital. This article seeks to study the importance of implementing cloud security training programs as the key to making users of varying hierarchal levels – from IT staff to top management, competent in Cloud Security. In this, the article presents the shared responsibility model, the transformation of the threat landscape, and the significance of a continuous learning process t23o show how biannual awareness training sessions, role-based awareness training, and adaptation of modern technology such as AI, machine learning, VRs, and ARs improve the security of an organization's individuals. These latest events, such as the Capital One or Tesla cyber incidents, demonstrate that security should be a constant agenda. The author then explains what concerns the future of cloud security training and how the necessity of security education is still vital as the quantum of threats continues to grow.

References

Alam, A. (2021, December). Cloud-based e-learning: development of conceptual model for adaptive e-learning ecosystem based on cloud computing infrastructure. In International Conference on Artificial Intelligence and Data Science (pp. 377-391). Cham: Springer Nature Switzerland.

Alnajim, A. M., Habib, S., Islam, M., AlRawashdeh, H. S., & Wasim, M. (2023). Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches. Symmetry, 15(12), 2175.

Ashibani, Y., & Mahmoud, Q. H. (2017). Cyber physical systems security: Analysis, challenges and solutions. Computers & Security, 68, 81-97.

Bahadoran, M. R., Ghasemi, H., Farahani, A., & Hosaini, M. (2023). The effect of gamification on improving the performance of organizations by mediation of knowledge management. Int. J. Hum. Capital Urban Manage, 8(1), 43-54.

Bendler, D., & Felderer, M. (2023). Competency models for information security and cybersecurity professionals: analysis of existing work and a new model. ACM Transactions on Computing Education, 23(2), 1-33.

Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel. John Wiley & Sons.

Bhardwaj, A. (2023). New Age Cyber Threat Mitigation for Cloud Computing Networks. Bentham Science Publishers.

Bruzual, D., Montoya Freire, M. L., & Di Francesco, M. (2020, June). Automated assessment of Android exercises with cloud-native technologies. In Proceedings of the 2020 ACM Conference on innovation and technology in computer science education (pp. 40-46).

Caligiuri, P., & Caprar, D. V. (2023). Becoming culturally agile: Effectively varying contextual responses through international experience and cross-cultural competencies. The International Journal of Human Resource Management, 34(12), 2429-2450.

Camos, V., Johnson, M., Loaiza, V., Portrat, S., Souza, A., & Vergauwe, E. (2018). What is attentional refreshing in working memory?. Annals of the new York Academy of Sciences, 1424(1), 19-32.

Chatterjee, J. (2017). Strategy, human capital investments, business‐domain capabilities, and performance: a study in the global software services industry. Strategic Management Journal, 38(3), 588-608.

Chauhan, A. (2021). QUANTIFYING SECURITY IN PLATFORM AS A SERVICE USING MEAN FAILURE COST: A STAKEHOLDER’S PERSPECTIVE.

Da Veiga, A., & Martins, N. (2015). Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security, 49, 162-176.

Dimitrov, W. (2020). Analysis of the need for cyber security components in the study of advanced technologies. In INTED2020 Proceedings (pp. 5259-5268). IATED.

Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813-80828.

Dotson, C. (2023). Practical Cloud Security. " O'Reilly Media, Inc.".

El-Gazzar, R., Hustad, E., & Olsen, D. H. (2016). Understanding cloud computing adoption issues: A Delphi study approach. Journal of Systems and Software, 118, 64-84.

George, A. S., Sagayarajan, S., AlMatroudi, Y., & George, A. H. (2023). The Impact of Cloud Hosting Solutions on IT Jobs: Winners and Losers in the Cloud Era. Partners Universal International Research Journal, 2(3), 1-19.

Gill, A. (2018). Developing a real-time electronic funds transfer system for credit unions. International Journal of Advanced Research in Engineering and Technology (IJARET), 9(1), 162-184.

Guffey, J., & Li, Y. (2023, March). Cloud Service Misconfigurations: Emerging Threats, Enterprise Data Breaches and Solutions. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0806-0812). IEEE.

Juturi, V. P. K. (2023). Success Factors of Adopting Cloud Enterprise Resource Planning. Universal Journal of Computer Sciences and Communications, 9-14.

Lane, M., Shrestha, A., & Ali, O. (2017). Managing the risks of data security and privacy in the cloud: a shared responsibility between the cloud service provider and the client organisation. Bright Internet Global Summit 2017.

Lei, Z., & Naveh, E. (2023). Unpacking errors in organizations as processes: Integrating organizational research and operations management literature. Academy of Management Annals, 17(2), 798-844.

Nyati, S. (2018). Revolutionizing LTL Carrier Operations: A Comprehensive Analysis of an Algorithm-Driven Pickup and Delivery Dispatching Solution. International Journal of Science and Research (IJSR), 7(2), 1659-1666.

Nyati, S. (2018). Transforming Telematics in Fleet Management: Innovations in Asset Tracking, Efficiency, and Communication. International Journal of Science and Research (IJSR), 7(10), 1804-1810.

Raina, R. (2016). A systems perspective on cybersecurity in the cloud: frameworks, metrics and migration strategy (Doctoral dissertation, Massachusetts Institute of Technology).

Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: implementation, management, and security. CRC press.

Sadgrove, K. (2016). The complete guide to business risk management. Routledge.

Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching cybersecurity using the cloud. IEEE Transactions on Learning Technologies, 8(4), 383-392.

Schroeder, J. (2017). Advanced persistent training: take your security awareness program to the next level. Apress.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International journal of information management, 36(2), 215-225.

Szabó, Z., & Bilicki, V. (2023). A new approach to web application security: Utilizing gpt language models for source code inspection. Future Internet, 15(10), 326.

Tahirkheli, A. I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., ... & Kim, K. I. (2021). A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges. Electronics, 10(15), 1811.

Taulli, T. (2023). Change Management: Building the Right Foundation. In ChatGPT and Bard for Business Automation: Achieving AI-Driven Growth (pp. 91-106). Berkeley, CA: Apress.

Tiwari, C. K., Bhaskar, P., & Pal, A. (2023). Prospects of augmented reality and virtual reality for online education: a scientometric view. International Journal of Educational Management, 37(5), 1042-1066.

Triantafyllou, S., & Georgiadis, C. (2022). Gamification of MOOCs and security awareness in corporate training.

Waema, D. (2022). Challenges of Implementing Cloud Technologies in Kenyan Universities (Doctoral dissertation, University of Nairobi).

Werner, J., Westphall, C. M., & Westphall, C. B. (2017). Cloud identity management: A survey on privacy strategies. Computer Networks, 122, 29-42.

Downloads

Published

2023-12-29

How to Cite

Wasif Khan. (2023). DEVELOPING AND DELIVERING COMPREHENSIVE CLOUD SECURITY TRAINING PROGRAMS: THE IMPORTANCE OF CONTINUOUS EDUCATION IN MAINTAINING HIGH LEVELS OF SECURITY AWARENESS. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET), 14(07), 132-156. https://lib-index.com/index.php/IJARET/article/view/IJARET_14_07_009