Cloud Storming

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Revision as of 06:48, 31 August 2017 by Kelven (talk | contribs)
Jump to navigation Jump to search
1. Advancements in technology results in more organizations picking up cloud to store their information. However, tackling security issues regarding cloud data storage is a challenging task. The pervasive nature of information stored in the cloud is taken advantaged of during cloud storming attacks.

Related Term: Configuration Exploitation

(Source: Business Continuity Management Institute - BCM Institute)

A Manager's Guide to Business Continuity Management for Cyber Security Incident Response (2017) BUY!












 

2. Security tends to be a challenge when working with data and assets outside of normal environments. Cloud storming attacks take advantage of the proliferation of data stored in the cloud, the inherent shortfalls in outsourced cybersecurity, and the challenge of breach response activities.
Source: (Verizon, 2017)