Cloud Attack Vectors Building Effective Cyber-Defense Strategies to Protect Cloud Resources

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistan...

Full description

Bibliographic Details
Main Authors: Haber, Morey J., Chappell, Brian (Author), Hills, Christopher (Author)
Format: eBook
Language:English
Published: Berkeley, CA Apress 2022, 2022
Edition:1st ed. 2022
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Chapter 1. Introduction
  • Chapter 2. Cloud Computing
  • Chapter 3. Cloud Service Proviers
  • Chapter 4. Cloud Definitions
  • Chapter 5. Asset Manager
  • Chapter 6. Attack Vectors
  • Chapter 7. Mitigation Strategies
  • Chapter 8. Regulatory Compliance
  • Chapter 9. Architectures
  • Chapter 10. Swarm Intelligence
  • Chapter 11. Chaos Engineering
  • Chapter 12: Imposter Syndrome
  • Chapter 13: Selecting a Cloud Service Provider
  • Chapter 14: Security Recommendations for your Cloud Environment
  • Chapter 15: Conclusion
  • Appendix A
  • Appendix B.