Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources /
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus--it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resista...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
Apress,
[2022]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Foreword
- 1. Introduction
- 2. Cloud computing
- 3. Cloud service providers
- 4. Cloud definitions
- 5. Asset management
- 6. Attack vectors
- 7. Mitigation strategies
- 8. Regulatory compliance
- 9. Architectures
- 10. Swarm intelligence
- 11. Chaos engineering
- 12. Imposter syndrome
- 13. Selecting a cloud service provider
- 14. Security recommendations for your cloud environment
- 15. Conclusion.