A short talk introducing some concepts around cloud security, starting with the fact that our focus needs to be on security generally before we can dive in to things specific to "cloud".
2017, including £4.6bn from British internet users, according to a new report from cybersecurity firm Norton. The most common crimes were generally low- tech, such as attempts to trick individuals into revealing their personal information through bogus emails with generally low costs to victims.” https://www.theguardian.com/technology/2018/jan/23/cybercrime-130bn-stolen- consumers-2017-report-victims-phishing-ransomware-online-hacking https://us.norton.com/cyber-security-insights-2017
resilience 3. Separation between users 4. Governance framework 5. Operational security 6. Personnel security 7. Secure development 8. Supply chain security 9. Secure user management 10. Identity and authentication 11. External interface protection 12. Secure service administration 13. Audit information for users 14. Secure use of the service
resilience 3. Separation between users 4. Governance framework 5. Operational security 6. Personnel security 7. Secure development 8. Supply chain security 9. Secure user management 10. Identity and authentication 11. External interface protection 12. Secure service administration 13. Audit information for users 14. Secure use of the service