Difference between revisions of "Cloud Storming"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
Line 1: Line 1:
 
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
 
| '''1.''' Advancements in technology results in more organizations picking up cloud to store their information. Cloud storming refers to cyber criminals taking advantage of the pervasive nature of information stored in the cloud to perform malicious activities.
 
| '''1.''' Advancements in technology results in more organizations picking up cloud to store their information. Cloud storming refers to cyber criminals taking advantage of the pervasive nature of information stored in the cloud to perform malicious activities.
Related Term: [[Configuration_Exploitation|Configuration Exploitation]] {{Bcm Institute Source}}
+
'''Related Term''': [[Configuration_Exploitation|Configuration Exploitation]]  
 
+
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/>
 +
{{Template:BLCoursesBanner}}
 +
{{Bcm Institute Source}}
 
|}
 
|}
 
+
&nbsp;
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
{{Template: BookMGBCMResponse}}
 
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
 
 
 
'''2.''' Security tends to be a challenge when working with data and assets outside of normal environments. Cloud storming attacks take advantage of the proliferation of data stored in the cloud, the inherent shortfalls in outsourced cybersecurity, and the challenge of breach response activities.<br/> '''Source:''' (Verizon, 2017)<br/> &nbsp;
 
'''2.''' Security tends to be a challenge when working with data and assets outside of normal environments. Cloud storming attacks take advantage of the proliferation of data stored in the cloud, the inherent shortfalls in outsourced cybersecurity, and the challenge of breach response activities.<br/> '''Source:''' (Verizon, 2017)<br/> &nbsp;
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 03:36, 3 November 2020

1. Advancements in technology results in more organizations picking up cloud to store their information. Cloud storming refers to cyber criminals taking advantage of the pervasive nature of information stored in the cloud to perform malicious activities.

Related Term: Configuration Exploitation







(Source: Business Continuity Management Institute - BCM Institute)

 

2. Security tends to be a challenge when working with data and assets outside of normal environments. Cloud storming attacks take advantage of the proliferation of data stored in the cloud, the inherent shortfalls in outsourced cybersecurity, and the challenge of breach response activities.
Source: (Verizon, 2017)