From the course: Cloud Security Considerations for General Industry
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Treacherous 12
From the course: Cloud Security Considerations for General Industry
Treacherous 12
- [Instructor] This chapter names the top 12 cloud computing threats to data, highlights the four that chief information security officers from your industry are most concerned about, and then presents case studies to demonstrate how security controls can be used to protect your organization against those threats. In creating the 2016 Treacherous 12, the Cloud Security Alliance Top Threats Working Group conducted research in two primary stages. Both stages used surveys and questionnaires as instruments of study. Of the respondents who answered demographic questions, 83.3% identified themselves as Security Specialist, 12.2% as Software Specialist, and 9.95% as Networking Specialist, followed by other categories. When you are considering threats, it is useful to ask questions like, how can an attacker change the authentication data? Or what is the impact if an attacker can read the user profile data? Or even, what happens…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.