From the course: Cloud Security Considerations for General Industry

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Treacherous 12

Treacherous 12

From the course: Cloud Security Considerations for General Industry

Start my 1-month free trial

Treacherous 12

- [Instructor] This chapter names the top 12 cloud computing threats to data, highlights the four that chief information security officers from your industry are most concerned about, and then presents case studies to demonstrate how security controls can be used to protect your organization against those threats. In creating the 2016 Treacherous 12, the Cloud Security Alliance Top Threats Working Group conducted research in two primary stages. Both stages used surveys and questionnaires as instruments of study. Of the respondents who answered demographic questions, 83.3% identified themselves as Security Specialist, 12.2% as Software Specialist, and 9.95% as Networking Specialist, followed by other categories. When you are considering threats, it is useful to ask questions like, how can an attacker change the authentication data? Or what is the impact if an attacker can read the user profile data? Or even, what happens…

Contents