Week 3 - Cloud Vulnerability Scans

In week 3, we continued to learn more about vulnerability scans, but this time, we continued learning by understanding cloud vulnerability. In recent years, we have relied on cloud services to help store our resources and data to continue to do the work required on different devices. With this resource and data being moved to a cloud service, some vulnerabilities could be hidden in the cloud provider.

When doing a vulnerability scan on a cloud service, the scan will search for any security risk hidden in the cloud service. These security risks could be unauthorized access to the cloud, poor passwords, and further authentication that the provider hasn't set up. Our data needs to be safe on and off the cloud, so vulnerability scans are necessary when storing our essential data in the cloud. Ensuring there aren't any security risks in the cloud can ensure the data is locked and safe from cybercriminals.

Comments

Popular posts from this blog

Week 1 - Introduction

Week 2 - Vulnerability Scan