From the course: Cloud Security Considerations for the Healthcare Industry

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Treacherous 12

Treacherous 12

From the course: Cloud Security Considerations for the Healthcare Industry

Start my 1-month free trial

Treacherous 12

- [Instructor] This entire course is focused on how to best protect critical healthcare data from loss or compromise. This chapter names the top 12 cloud computing threats to data, highlights the four that chief information security officers from your industry are most concerned about, and then presents three case studies to demonstrate how security controls can be used to protect your organization against those threats. In creating the 2016 Treacherous 12, the Cloud Security Alliance Top Threats Working Group conducted research in two primary stages. Both stages used surveys and questionnaires as instruments of study. Of the respondents who answered demographic questions, 83.3% identified themselves as security specialists, 12.2% as software specialists, and 9.95% as networking specialists, followed by other categories. When you are considering threats, it is useful to ask questions like, how can an attacker change the authentication data? Or what is the impact if an attacker can…

Contents