Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources /
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus--it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resista...
Call Number: | Libro Electrónico |
---|---|
Main Authors: | , , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
New York :
Apress,
[2022]
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Foreword
- 1. Introduction
- 2. Cloud computing
- 3. Cloud service providers
- 4. Cloud definitions
- 5. Asset management
- 6. Attack vectors
- 7. Mitigation strategies
- 8. Regulatory compliance
- 9. Architectures
- 10. Swarm intelligence
- 11. Chaos engineering
- 12. Imposter syndrome
- 13. Selecting a cloud service provider
- 14. Security recommendations for your cloud environment
- 15. Conclusion.