Cargando…

Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources /

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus--it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resista...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Haber, Morey J. (Autor), Chappell, Brian (Autor), Hills, Christopher (Security strategist) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Apress, [2022]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Foreword
  • 1. Introduction
  • 2. Cloud computing
  • 3. Cloud service providers
  • 4. Cloud definitions
  • 5. Asset management
  • 6. Attack vectors
  • 7. Mitigation strategies
  • 8. Regulatory compliance
  • 9. Architectures
  • 10. Swarm intelligence
  • 11. Chaos engineering
  • 12. Imposter syndrome
  • 13. Selecting a cloud service provider
  • 14. Security recommendations for your cloud environment
  • 15. Conclusion.