Understanding Security Threats in Cloud EnvironmentsSantos, O., & Taylor, R. (2020). 1.11 Understanding security threats in cloud environments (Lesson 1: Understanding cybersecurity threats against on-premise and cloud environments) [Video]. In CCNP and CCIE security core SCOR 350-701. Pearson IT Certification.
Since cloud-based services are accessible via the Internet, they are open to a number of attacks. Some of the potential attack vectors that criminals and threat actors might attempt include session hijacking, which is whenever the attacker can actually sniff or intercept traffic to takeover a legitimate connection to a cloud service, or a DNS-based attack, or cross-site scripting, SQL injections, session riding, and many other application-based vulnerabilities. In this video, you will understand security threats in cloud environments.