Cloud Security Exploits By The Numbers


Before the bad guys can attack IT infrastructure, they typically want to know what is on the network so they can better identify vulnerabilities and thereby increase the odds of a successful attack. Reconnaissance activities focus on mapping the networks, applications and/or services through the use of fingerprinting, port scans and similar activities.

Incident Occurrence: 9 percent

Incident Frequency: 1.5