Improving web application security threats and countermeasures
|
1 |
|---|
Runbook Playbook Part 3 Network, Mobile Device, and Cloud Service Guidelines
Runbook Playbook Part 3 Network, Mobile Device and Cloud Service Guidelines 2
The security of the equipment is important when it comes to network, cloud, and mobile because the last thing any organization wants is to lose data due to unsecured network or equipment that requires some sort security to keep data safe. There have to be guidelines established that can provide a point of reference to employees to use when they are working to secure network connection, mobile devices, and cloud services. Now, trying to maintain a secure network for a small business or home, does require time and some energy.
Being proactive when it comes to keeping your data secured in the cloud is very crucial, based on the amount of data is uploaded into the cloud in today’s world. It could be impossible to fully protect every data that is loaded using cloud services, but there are certain measures we can take to reduce some of these risks. We can start with reading and understand the service
Runbook Playbook Part 3 Network, Mobile Device and Cloud Service Guidelines 4
Ivey, V. (2013, December 16). 5 Tips to Keep Your Data Secure on the Cloud. Retrieved from https://www.cio.com/article/2380182/cloud-security/5-tips-to-keep-your-data-secure-on-the-cloud.html
Meier, J.D, Mackman, A, Dunner, M, Vasireddy, S, Escamilla, R & Murukan, A. (2003, June). Improving Web Application Security: Threats and Countermeasures. Retrieved from
https://msdn.microsoft.com/en-us/library/ff648651.aspx


