Cloud Attack Vectors Building Effective Cyber-Defense Strategies to Protect Cloud Resources
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistan...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress
2022.
|
Edición: | 1st ed. 2022. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009671496306719 |
Tabla de Contenidos:
- Chapter 1. Introduction
- Chapter 2. Cloud Computing
- Chapter 3. Cloud Service Proviers
- Chapter 4. Cloud Definitions
- Chapter 5. Asset Manager
- Chapter 6. Attack Vectors
- Chapter 7. Mitigation Strategies
- Chapter 8. Regulatory Compliance
- Chapter 9. Architectures
- Chapter 10. Swarm Intelligence
- Chapter 11. Chaos Engineering
- Chapter 12: Imposter Syndrome
- Chapter 13: Selecting a Cloud Service Provider
- Chapter 14: Security Recommendations for your Cloud Environment
- Chapter 15: Conclusion
- Appendix A
- Appendix B.