Are you a cloud user who has concerns about security? This course, Cyber Security Awareness: Security for Cloud Services, can help you use these services with greater security. First, you will run through a quick cloud architecture overview before moving on and talking about clouds and security. Finally, you will look at cloud risk mitigation strategies to help mitigate risks and employ best practices for cloud usage.
Bob started with the Department of the Interior’s (DOI) National Business Center (NBC) in October 2007. One of his primary responsibilities was serving as Financial Management Directorate’s (FMDs) subject matter expert (SME) on all security related issues. Because of his experience, on two separate occasions Bob was called upon and served as the Chief Information Security Officer (CISO) for the National Business Center (NBC).
Introduction Hi everybody, and welcome to the Security for Cloud Services course. My name is Bob Bowles with Mentor Source. First, I want to thank you all for taking time out from your busy schedule to take this course, and I hope you will find it informative and useful. Let's take a quick look at what is happening in the industry. Just as companies and organizations are abandoning copper wire and moving to mobile, so is the trend of abandoning on-premise hosting and moving to cloud computing. In the past, people would run applications on their personal computers, or programs, from software downloaded on a physical computer or a server in the building. They use their networks for file storage, email, printer sharing, and such. Since they had been using personal computers so much and having control of their data and processing, many were afraid to let go and trust the physical network. Most of us want to control our data, our jobs, our destiny, and our lives. I can remember when a lot of people would not trust computers at all. People do not like change, so many have to adapt gradually to new technologies before they sink their trust into a new technology. For years we were used to client server environments where the processing and the storage of data were shared between the server and the client computer. Now with Facebook, Twitter, WhatsApp, Instagram, and Messenger, people are using the cloud whether they realize it or not. With every new technology and all the benefits, there also come some precautions and security risks. Remember years ago when Windows 98 came out? They talked about how this corrected 500 bugs in Windows NT. What they didn't tell you was how many bugs Windows 98 was bringing to the party. Hopefully this course will introduce you to some of the security risks with cloud computing and how to mitigate them. Next up is what you should know.