关键词:孤岛模式;云攻击;云滥用
摘 要:Cloud abuse is among the top threats experts expect to see in 2013; one avenue that abusecan take is when cybercriminals use social media vehicles to abuse cloud environments —such as SaaS-oriented user access through accepted BYOD channels or PaaS-orientedaccess via Twitter interchanges used by a development team to communicate cloudadministration updates. As this author has discussed before, many organizations employ areactive response when the breach occurs instead of taking more prudent proactive steps.Join the author as she provides a roadmap for abuse mitigation and illustrates what proactiveactions can be taken when abuse occurs.