欢迎访问行业研究报告数据库

行业分类

当前位置:首页 > 报告详细信息

找到报告 1 篇 当前为第 1 页 共 1

避免云滥用的风险

Avoid the risks of cloud abuse

作者:Judith M. Myerson 作者单位:IBM 加工时间:2013-12-04 信息来源:IBM 索取原文[9 页]
关键词:孤岛模式;云攻击;云滥用
摘 要:Cloud abuse is among the top threats experts expect to see in 2013; one avenue that abusecan take is when cybercriminals use social media vehicles to abuse cloud environments —such as SaaS-oriented user access through accepted BYOD channels or PaaS-orientedaccess via Twitter interchanges used by a development team to communicate cloudadministration updates. As this author has discussed before, many organizations employ areactive response when the breach occurs instead of taking more prudent proactive steps.Join the author as she provides a roadmap for abuse mitigation and illustrates what proactiveactions can be taken when abuse occurs.
© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服