Cloud Threats

  • Waschke M
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Clouds are everywhere today. Massive online retail sites like Amazon and Ebay rely on clouds for reliability and performance. Email and instant messaging are built on clouds. Services like Uber and Spotify would be hard to imagine without clouds. The great search engines like Google and Bing that comb the Internet are implemented on clouds. Social media like Facebook and Reddit are also cloud implementations. The term is everywhere, but exactly what is a cloud? And do clouds compromise our security and privacy? The answers to these questions are complex, but this chapter offers them.

Cite

CITATION STYLE

APA

Waschke, M. (2017). Cloud Threats. In Personal Cybersecurity (pp. 125–151). Apress. https://doi.org/10.1007/978-1-4842-2430-4_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free