Pular para o conteúdo principal

Compartilhe

Airbnb

O Airbnb possui seu próprio sistema de cadastro interno. Porém, no momento do check-in, muitos anfitriões solicitam documentos e chegam a tirar fotos do hóspede segurando o documento.  O problema é que esses dados ficam armazenados diretamente no aparelho do anfitrião, sem qualquer garantia de proteção adequada. Essa prática levanta sérias dúvidas sobre a segurança da informação e a conformidade com a LGPD (Lei Geral de Proteção de Dados) . Além disso, há relatos de que dados pessoais são enviados para portarias de condomínios, ampliando ainda mais os riscos de exposição. O Airbnb precisa aprimorar urgentemente esse tipo de conduta, estabelecendo protocolos claros de proteção e armazenamento de dados. A ausência de respostas transparentes da empresa sobre o nível de segurança dessas práticas demonstra uma falha significativa na forma como a plataforma lida com informações sensíveis de seus usuários.

Fundamentals of Cloud Security

Fundamentals of Cloud Security

4.7 (3 avaliações)
economies of scale and agility
Clique no cartão para virá-lo 👆
1 / 77
Termos nesta lista (77)
Which software development concept that also has been applied more generally to IT says that additional future costs for rework are anticipated due to an earlier decision or course of action that was necessary for agility but was not necessarily the most optimal or appropriate decision or course of action?

role-based access control
technical debt
software lifecycle
runtime environment
In which cloud service model are customers responsible for securing their virtual machines and the virtual machine operating systems, and for operating system runtime environments, application software, and application data?

platform as a service (PaaS)
identity as a service (IaaS)
software as a service (SaaS)
infrastructure as a service (IaaS)
Which phased approach of hybrid cloud security requires networking and security solutions that not only can be virtualized but also are virtualization-aware and can dynamically adjust as necessary to address communication and protection requirements, respectively?

consolidation servers within trust levels
dynamic computing fabric
consolidation servers across trust levels
selective network security virtualization
Which SASE security-as-a-service layer capability provides visibility into SaaS application use, understands where sensitive data resides, enforces company policies for user access, and protects data from hackers?

secure web gateway (SWG)
data loss prevention (DLP)
firewall as a service (FWaaS)
cloud access security broker (CASB)
Which Prisma SaaS feature connects directly to the applications themselves and provides continuous silent monitoring of the risks within sanctioned SaaS applications, with detailed luminosity that is not possible with traditional security solutions?

granular data visibility
large scale data control
data exposure visibility
contextual data exposure
What is the meaning of a SaaS application that is advertised as being HIPPA compliant?
A. Regardless of how you configure the application for your enterprise, you will be HIPPA compliant.
B. If your administrator configures the security settings on the application correctly, you will be HIPPA compliant.
C. If your administrator and your users use the application correctly, you will be HIPPA compliant.
D. If your administrator and your users use the application correctly, the application will not cause you to not be HIPPA compliant.
Which systems must you secure to ensure compliance with security standards?
A. the servers in the data center
B. the devices owned by the enterprise, whether they are servers in the data center, cloud vms you manage, or user endpoint devices
C. any system where the data for which you are responsible goes
D. every device that is either owned by the enterprise, or used by enterprise employees
True or False? Prisma SaaS is used to protect sanctioned SaaS use, as part of an integrated security solution that includes next-generation firewalls to prevent unsanctioned SaaS use. Prisma SaaS communicates directly with the SaaS applications themselves and therefore does not need to be deployed inline and does not require any software agents, proxies, additional hardware, or network configuration changes.
What is the relationship between SIEM and SOAR?
A. SIEM products implement the SOAR business process.
B. SIEM and SOAR are different names for the same product category.
C. SIEM systems collect information to identify issues that SOAR products help mitigate.
D. SOAR systems collect information to identify issues that SIEM products help mitigate.
Which two advantages does endpoint protection technology have over network traffic analysis? (Choose two.)
A. ability to identify most common attacks by their symptoms
B. deployed and managed centrally
C. easier to deploy endpoint protection when people work from home
D. detects command and control channels
E. can easily identify worms
What is the order in which the endpoint checks if a new program is safe?
A. behavioral threat protection, then local analysis, then WildFire query
B. local analysis, then behavioral threat protection, then WildFire query
C. WildFire query, then local analysis, then behavioral threat protection
D. local analysis, then WildFire query, then behavioral threat protection

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

Postagens mais visitadas