Please read the information below for your attention:
  1. Please wait the file link will be scanned to make sure you avoid the virus. We only attach download link from trusted cloud storage: Google Drive.
  2. After the scan complete, please tap or press the link to open or download the file source. 
  3. We recommend that you read the tutorial on Create the Direct Download Link from Google Drive Files or Folders and How to download files that cannot be downloaded on Google Drive (How to Fix Google Drive Download Limit For Shared Files)

How It Works: Cloud Security

How It Works: Cloud Security

How It Works: Cloud Security
How It Works: Cloud Security
Cloud computing is transforming the way we do business making IT more efficient and cost-effective. But it's also opening companies up to new types of cyber threats today it's not a matter of if but when. Mary is going on a cruise and notices the cruise lines website offers an image sharing mobile application that is hosted on a cloud. The app will let her access her itinerary track her trip and share her vacation images with friends over social networks. However after a week onboard Mary begins to feel a little uneasy and it's not seasickness. Many of her friends have complained to her that they were spammed after viewing photos she shared via the cruise line app. She complains to the cruise director.Meanwhile back on shore the cruise lines development team is already aware of the problem and is working to rectify it.

So how could a cruise line know about this type of breach before the users themselves are aware and what measures can they take to both alleviate any current problems and prevent them from happening again the best defense a security incident response team that can quickly take whatever steps are needed to thwart attacks and restore system health this team is on point to guard the cloud armed with the latest software and security technology they can tackle the full gamut of security issues through three important steps monitoring data gaining visibility in the cloud and managing access let's look at monitoring data Danielle is the Cruise Lines data security analyst her cloud data activity monitoring system notifies her that there's something fishy going on but the system doesn't just flag a set list of threats it can detect new types of possible security threats it uses advanced machine learning techniques to build detailed models of normal system behavior and flags any deviations to these models assessing the risk in each deviation this combined with built-in insights around known hacking techniques enables the system to rapidly detect unusual user and database activity Danielle goes to ian the enterprise security analyst.

Ian is able to provide her with the detail needed to gain visibility in the cloud he monitors all the traffic going in and out of the cloud using a variety of sophisticated software or virtualized software appliances it detects multiple suspicious events we call offences all this activity is collected and analyzed within the cloud to work out not only what is happening but who is responsible for the offence the system basically looks for patterns it will correlate perhaps millions of events as it searches for suspicious patterns patterns that deviate ignificantly from normal system behavior it provides the visibility to quickly pinpoint and identify the hackers credentials in this case. Ian and Danielle quickly realized that a group of hackers has compromised a team members password and used it to access the cloud management console from there they were able to create unauthorized administrator accounts which then introduced the malware that created the spam to address this issue

The Incident Response Team can remove the new administrator roles created by the hackers and change all cloud credentials and passwords these measures thwart the hackers malicious activity by shutting down their privileged access to prevent further cloud breaches Ian finally talks to Anika the Identity and Access Architect. Anika's job is to manage access she uses a privileged Identity0 Management System or PIM that controls access to the critical cloud resources that store confidential and sensitive information.

The PIM uses a method of checking fresh credentials in and out each time the system that Anika manages is accessed this adds an extra layer of security forusers who have the high level of access to this confidential information all of these steps are crucial particularly when you consider that a typical organization has 785 different cloud applications in use but surprisingly on average they only know about 60 of them the rest of the apps are unknown and unsanctioned security is a journey not a destination security intelligence monitors data gains visibility and manages access in order to evolve and respond to the ever-changing world of the cloud.

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel