Kashif Asad, Mohd. Faizan Farooqui2026-04-2320259781003409571https://doi.org/10.1201/9781003409571http://136.232.12.194:4000/handle/123456789/1762Cyberology An Optimized Approach to the Cyber-World Edited ByMohd. Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmed, Saurabh Shukla, Adil KaleemCloud computing has transformed the way businesses store, manage, and process data, providing unparalleled scalability, flexibility, and cost-effectiveness. However, the growth of cloud technology creates new cybersecurity difficulties and vulnerabilities. This research chapter provides a thorough examination of cyber risks and security frameworks in cloud computing settings. Various sorts of cyber risks, including data breaches, malware, distributed denial of service (DDoS) attacks, insider threats, and misconfigurations, are recognized and examined in the context of cloud computing. Furthermore, this study investigates current security frameworks and best practices for mitigating these vulnerabilities, such as encryption, access restrictions, authentication systems, and monitoring solutions. This study, which synthesizes insights from academic research, industry reports, and real-world case studies, provides valuable insights into the evolving landscape of cyber threats in cloud computing and makes practical recommendations for implementing effective security measures to protect cloud environments.en-USComputer ScienceEngineering & TechnologyA Study of Cyber Threats and Security Frameworks in Cloud ComputingBook chapter