From the course: Cybersecurity Awareness: Cloud Security (2022)
Defining cloud security terms
From the course: Cybersecurity Awareness: Cloud Security (2022)
Defining cloud security terms
- Before we can discuss cloud security, it's important that you understand what cloud computing and cloud security are. Let's go over some definitions. Let's start with cloud computing. This is the delivery of different internet services. There are a wide variety of different services, including storage and databases that you can access, save, and interact with remotely. The way these services are delivered vary and are categorized into three models, software as a service, platform as a service, and infrastructure as a service. Deep diving into all of these models are outside of the scope of this course, but I'm happy to give you an example of a model you're using right this very second. This course you are currently watching is being delivered through a software as a service model, built and shared by LinkedIn Learning. So little did you know, you're already taking advantage of the awesome capabilities of cloud computing. Cloud computing has taken the world by storm over the years, enabling individuals and organizations alike to reach new heights and technology. No matter where your data lives, it needs to be secured. That's where cloud security comes in. Cloud security can be defined as a set of policies, processes, and technologies, that work together to secure cloud infrastructure and data from any cyber threats. Putting these security measures in place isn't easy, but when done right and holistically, it can help an organization achieve continuous protection, support regulatory compliance, and protect user privacy. Many times, cloud security is usually told from an organizational perspective, meaning the focus is how can a security team protect an organization's assets. But cloud security is an important topic for organizations and individuals alike, as many of us work in the cloud every day and may not even know it. For example, if you're an Apple iPhone user you have to back up your information to the Apple iCloud. Usually to access your information, you need your username and password and an extra step for verification. Or perhaps you have a Gmail account. This is also a software as a service platform that utilizes my location, login device, and other information to verify that it's me logging in, as shown by this example screenshot. The benefits of cloud security are endless. Some of them include being super effective in protecting against attacks, such as distributed denial of service attacks. You also get higher availability, so you can be protected against threats in real time, instead of after the fact. And most importantly, it's cost friendly. So that way you don't have to spend tons of money to come up with your own protection solution. Now that you know what cloud security is, you're ready to start securing your own information.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.