Difference between revisions of "Cloud Storming"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" | {| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" | ||
|- | |- | ||
− | | '''1.''' Advancements in technology results in more organizations picking up cloud to store their information. | + | | '''1.''' Advancements in technology results in more organizations picking up cloud to store their information. Cloud storming refers to cyber criminals taking advantage of the pervasive nature of information stored in the cloud to perform malicious activities. |
− | Related Term: [[Configuration Exploitation]] | + | Related Term: [[Configuration_Exploitation|Configuration Exploitation]] {{Bcm Institute Source}} |
− | {{Bcm Institute Source}} | ||
|} | |} |
Revision as of 07:52, 31 August 2017
1. Advancements in technology results in more organizations picking up cloud to store their information. Cloud storming refers to cyber criminals taking advantage of the pervasive nature of information stored in the cloud to perform malicious activities.
Related Term: Configuration Exploitation
|
2. Security tends to be a challenge when working with data and assets outside of normal environments. Cloud storming attacks take advantage of the proliferation of data stored in the cloud, the inherent shortfalls in outsourced cybersecurity, and the challenge of breach response activities.
Source: (Verizon, 2017)