Cloud 101CircleEventsBlog
Join AT&T Cybersecurity in Chicago to learn top 2024 resilience tactics on May 21st!

Download Publication

Top Threats to Cloud Computing Deep Dive: Chinese Translation
Top Threats to Cloud Computing Deep Dive: Chinese Translation

Top Threats to Cloud Computing Deep Dive: Chinese Translation

Release Date: 06/24/2017

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleve...
Cloud Threat Modeling
Cloud Threat Modeling
Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident
Automation is Key: DHS Report Unveils Lessons from the Microsoft Ex...
Published: 05/02/2024
AI Hallucinations: The Emerging Market for Insuring Against Generative AI's Costly Blunders
AI Hallucinations: The Emerging Market for Insuring Against Generat...
Published: 04/23/2024
Do You Know These 7 Terms About Cyber Threats and Vulnerabilities?
Do You Know These 7 Terms About Cyber Threats and Vulnerabilities?
Published: 04/19/2024
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Published: 04/10/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training