From the course: Cloud Security Considerations for Government and the Military

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Treacherous 12

Treacherous 12

- [Instructor] This entire course is focused on how to protect critical public sector data from loss or compromise. This chapter names the top 12 cloud computing threats to data, highlights the four that chief information security officers from your industry are most concerned about, and then presents three case studies to demonstrate how security controls can be used to protect your organization against those threats. In creating the 2016 Treacherous 12, the Cloud Security Alliance Top Threats Working Group conducted research in two primary stages. Both stages used surveys and questionnaires as instruments of study. Of the respondents who answered demographic questions, 83.3% identified themselves as Security Specialist, 12.2% as Software Specialist, and 9.95% as Networking Specialist, followed by other categories. When you are considering threats, it is useful to ask questions like, how can an attacker change the…

Contents