Cloud Security Basics: Protecting Infrastructure and Data in Cloud Environments
Cloud security shared responsibility: provider secures infrastructure of the cloud, you secure your data and applications in the cloud.
All articles tagged with "Security"
Cloud security shared responsibility: provider secures infrastructure of the cloud, you secure your data and applications in the cloud.
Authentication verifies WHO you are with passwords or biometrics. Authorization determines WHAT you can access based on permissions and roles.
Threat modeling process: identify assets to protect like data and systems, identify threat actors like hackers or insiders, and analyze attack vectors.
Data protection fundamentals: encryption at rest and in transit, access controls using least privilege granting only necessary permissions.
Common breach causes: weak credentials like default passwords, unpatched vulnerabilities with known fixes, misconfigured cloud storage.
Security protects from threats like unauthorized access and breaches. Privacy controls data use—what's collected, shared, and stored about individuals.
Security tradeoffs: security vs usability where protection adds friction, security vs performance where encryption slows systems.
Secure system design principles: Defense in depth uses multiple layers, least privilege grants minimum necessary access, fail secure defaults to locked.
Security risk management: identify threats and assets, assess likelihood and impact of each risk, then mitigate through controls and monitoring.
Cybersecurity protects computer systems, networks, and data from unauthorized access, theft, damage, and disruption through defenses and monitoring.
Encryption transforms plaintext into ciphertext using algorithms and keys. Intercepted data is useless without the key. Symmetric and asymmetric types exist.