Path Of A Cyber Attacker
We’ve covered a fair bit of infosec here on CloudTweaks over the years. It’s an important area for all regardless of if you’re a consumer or a business.
Security expert and consultant – Chetan Soni, discusses some of the security issues and tools to consider as part of your business plan: “Cloud computing has become a business solution for many organizational problems. But there are security risks involved with using cloud servers: service providers generally only take responsibility of keeping systems up, and they neglect security at many ends. Therefore, it is important that clouds are properly penetration (pen) tested and secured to ensure proper security of user data…”
So what is it that cyber attackers really want when invading a cloud network? Well, data really. Anything that can be sold in the underground market such as cloud account credentials, scanned passports and stolen credit card information is just a start for this group.
Attached below is an infographic provided by Symantec which is very telling and frightening of what awaits in this growing underground market.
Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services. Contact us for ways on how to contribute and support our dedicated cloud community.