Content deleted Content added
Reverting edit(s) by 173.26.230.96 (talk) to rev. 1159926874 by Cewbot: Vandalism (from contribs) (RW 16.1) |
m Clarified that the CIA triad refers to confidentiality, integrity and availability, and provided more meaningful examples of the dual use of controls |
||
Line 78:
== Data security ==
There are numerous security threats associated with cloud data services. This includes traditional threats and non-traditional threats. Traditional threats include: [[network eavesdropping]], illegal invasion, and denial of service attacks, but also specific cloud computing threats, such as side channel attacks, virtualization vulnerabilities, and abuse of cloud services. In order to mitigate these threats security controls often rely on monitoring the three areas of the CIA triad. The CIA Triad refers to confidentiality
It is important to note that many effective security measures cover several or all of the three categories. Encryption for example
=== Confidentiality ===
|