From the course: Cisco CCNP SCOR Security (350-701) Cert Prep: 1 Security Concepts and Network Security

Unlock this course with a free trial

Join today to access over 22,600 courses taught by industry experts.

Cloud-based threats

Cloud-based threats

- [Instructor] Very commonly today, we're seeing hybrid solutions for enterprise networks, which leverage cloud-based environments to host applications and store data, among other things. Many threats that we see to cloud-based environments are the same as outlined with on-premise threats, but there are some specific types of cloud-based threats that we want to examine. Before we look at those, let's examine the different cloud deployment models that we have. First, we have the public cloud deployment, which is the most common method of cloud computing. Microsoft Azure is an example of this, where the cloud resources are owned and operated by a third party service provider. This allows for lower costs because you don't have to purchase equipment, but rather you're paying for the services that you use. Also, maintenance falls to the third party rather than the organization. High reliability and ease of scalability are also features of public cloud deployments. Then we have the private…

Contents