Flashcards
Cloud-related threats
access control, data loss, insider threat mitigation (AUB), email security and malware protection
What is user access?
legit and malicious user activity while they are trying to access your cloud services
Suspected Bot Attack examples
User login from suspicious location; abnormal login pattern; multiple login attempts
Abnormal Admin Activity example
Abnormal user activity while using your cloud services
Malware in Cloud Drive explanation
persistent and transient threats (malware and ransomware) at your cloud services
Malware activity (service threat)
A user uploads files that might be infected with a virus or other malwares to the cloud
Suspicious Ransomware Activity
A user up-loads to the cloud service files that might be locked by a ransomware
Email Anti-phishing
Mitigates phishing emails sent to your cloud email services
Abnormal sender (email anti-phishing)
email sender tries to impersonate a legit or well-known sender or domain
Suspicious embedded content (email anti-phishing)
email includes suspicious links, embedded content or attachments
Malware on Endpoint
Mitigates the risks associated with vulnerable and infected devices that are used to access your cloud services
UAC
User access control is a mandatory access control enforcement feature introduced w/ Microsoft Windows
4 main domains
email, cloud applications, data, end point security
CCPA (California Consumer Privacy Act)
aimed to enhance privacy rights and consumer protection for residents in the state
CCPA company criteria
- Gross annual revenue over $25M
- Annually purchases or receives for commercial purposes, or sells or shares for commercial purposes, personal information for 50,000 or more consumers, households, or devices in the state of California.
- Or generates 50 percent or more of their annual gross revenue from selling personal information.