CHAPTER 4: SECURITY THREATS ASSOCIATED WITH CLOUD COMPUTING
The previous chapter illustrated some of the potential benefits and pitfalls associated with the security of Cloud computing.
This chapter highlights some of the threat actors that may be in a position to attack a Cloud-based service. Some of the threat actors discussed in this chapter are taken from the NIST list of important actors for public Clouds available from:
Alternative threat actor lists are available from the likes of CESG/NCSC via the now withdrawn HMG Information Assurance Standard 1 (NCSC currently points towards NIST SP800-3039 as an example threat taxonomy), and as part of the Information Security Forum (ISF) IRAM v2 risk assessment ...