Securing Cloud Computing Models

by Torrell Griffin
Oct. 2, 2017 1 comment Infosecwriters Apps & Hardening

The purpose of this report, in essence, is to define cloud technology as well as describe some of the pros and cons of utilizing a number of different cloud services. Cloud technology offers a number of different methods as far as implementation goes, and along with each option, comes a new set of pros and cons. One method or option may be secure than the other, while the next method may offer more flexibility and control to the user. Security has definitely continued to become more and more important over time.

Irina Alexandra Negrii 7 months ago

In this primer on cloud computing security i learned a lot about the basics of data security in the cloud, how to secure network infrastructure and devices that interact with cloud-based services and the threats and attacks that pose a risk to enterprises.