Skip main navigation

Introduction to Cloud Computing and Cloud Security

.
9.2
STEVE SHARMA: When I’m working with the number of our government and enterprise customers. So one of the customer, government customer will experience wannacry, which is called the Battier wannacry attack incident. The end-user computer, all the screens, and everything will be locked with encryption code and it will ask for some ransomware, which is called, let’s say, it’s kind of ransomware that asks for money and, the data and the access being locked by a malicious user from the cloud. The government was, been panicked and there was a two days of shutdown for a number of key services, in the health department of one of the state.
49.9
And, it was an eyeopener for the government as well, to practice cybersecurity and look for the more deeper cloud steady controls. If the government agency is using, some of the cloud-based applications or the cloud services, whether in form of infrastructure as a service or platform as a service or just as an applications, or softwares as a service.
This article is from the free online

Introduction to Digital Transformation: Understand and Manage Digital Transformation in the Workplace

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education