Sameer Hasan AlbakriBharanidharan ShanmugamGanthan Narayana SamyNorbik Bashah IdrisAzuan Ahmed2024-05-282024-05-2820152180-3722https://doi.org/10.11113/jt.v73.4197https://journals.utm.my/jurnalteknologi/article/view/4197/2959https://oarep.usim.edu.my/handle/123456789/4634Volume: 73 No: 2 Special Issue on International Conference of Recent Trends in Information and Communication Technology (IRICT 2014)The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods' ability to assess the security risks in cloud computing environments.en-USSecurity risk assessment; cloud computing; security risk assessment in cloud computingTraditional Security Risk Assessment Methods In Cloud Computing Environment: Usability AnalysisArticle8589732