Access Millions of academic & study documents

Done32

Content type
User Generated
Subject
Computer Science
School
Westren
Type
Homework
Showing Page:
1/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: CLOUD SECURITY ALLIANCE-TOP THREATS Cloud Security Alliance-top Threats Institution Affiliation Student Name Date 1 CLOUD SECURITY ALLIANCE-TOP THREATS 2 Introduction Cloud computing has been one of the newest technology where companies access get ondemand delivery of database, storage, computing power, and many other Information Technology resources and services through the internet. The most benefit of cloud computing is the fact that companies can use as much or as little of these services and resources according to their demand. Resources and services are fully managed and secured by cloud service providers. Companies need only to have a computer and internet access, making it economical and cheap (Subramanian & Jeyaraj, 2018). However, according to Cloud Security Alliance (CSA)- Top Threats, cloud computing has created new security problems and breaches that bypass the benefits of companies switching to cloud technology (Top Threats Working Group, 2016). Some of these security issues are data breaches, insecure APIs, account hacking, loss of data, and insufficient due diligence. Key Points Summary A data breach is where sensitive, confidential, or protected information is viewed, released, stolen, or used by unauthorized individual or group of people. This may be as a result of human error, target attack, or inadequate security practices. Cloud-based data for a specific company can be breached and can be used against the company by competitors and oth ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4