Cloud Attack Vectors Building Effective Cyber-Defense Strategies to Protect Cloud Resources

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistan...

Descripción completa

Detalles Bibliográficos
Otros Autores: Haber, Morey J., author (author), Chappell, J. B. (John Brian), author, Hills, Christopher (Security strategist), author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berkeley, CA : Apress 2022.
Edición:1st ed. 2022.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009671496306719
Tabla de Contenidos:
  • Chapter 1. Introduction
  • Chapter 2. Cloud Computing
  • Chapter 3. Cloud Service Proviers
  • Chapter 4. Cloud Definitions
  • Chapter 5. Asset Manager
  • Chapter 6. Attack Vectors
  • Chapter 7. Mitigation Strategies
  • Chapter 8. Regulatory Compliance
  • Chapter 9. Architectures
  • Chapter 10. Swarm Intelligence
  • Chapter 11. Chaos Engineering
  • Chapter 12: Imposter Syndrome
  • Chapter 13: Selecting a Cloud Service Provider
  • Chapter 14: Security Recommendations for your Cloud Environment
  • Chapter 15: Conclusion
  • Appendix A
  • Appendix B.