Loading…

Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources /

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus--it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resista...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Authors: Haber, Morey J. (Author), Chappell, Brian (Author), Hills, Christopher (Security strategist) (Author)
Format: Electronic eBook
Language:Inglés
Published: New York : Apress, [2022]
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Foreword
  • 1. Introduction
  • 2. Cloud computing
  • 3. Cloud service providers
  • 4. Cloud definitions
  • 5. Asset management
  • 6. Attack vectors
  • 7. Mitigation strategies
  • 8. Regulatory compliance
  • 9. Architectures
  • 10. Swarm intelligence
  • 11. Chaos engineering
  • 12. Imposter syndrome
  • 13. Selecting a cloud service provider
  • 14. Security recommendations for your cloud environment
  • 15. Conclusion.