Presented to you through Paradigm Publishing Services
Mercury Learning and Information
Book
Licensed
Unlicensed
Requires Authentication
Empirical Cloud Security
Practical Intelligence to Evaluate Risks and Attacks
Language:
English
Published/Copyright:
2021
About this book
This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.
Features:
- Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applications
- Covers topics such as cloud architecture and security fundamentals, database and storage security, data privacy, security and risk assessments, controls related to continuous monitoring, and more
- Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread malware
Author / Editor information
Sood Aditya K. :
Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 13 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as BlackHat, DEFCON, Virus Bulletin, and others.
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
CONTENTS
vii -
Download PDFPublicly Available
PREFACE
xvii -
Download PDFPublicly Available
ACKNOWLEDGMENTS
xxi -
Download PDFPublicly Available
ABOUT THE AUTHOR
xxiii -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS
1 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT
23 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT
75 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT
125 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
163 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW
201 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT
249 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 8 PRIVACY IN THE CLOUD
279 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS
301 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
341 -
Download PDFRequires Authentication UnlicensedLicensed
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD
371 -
Download PDFRequires Authentication UnlicensedLicensed
CONCLUSION
403 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE
405 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX B LIST OF SERVERLESS FRAMEWORKS
407 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS
409 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE
411 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES
413 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS
415 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS
417 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS
419 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES
421 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES
423 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX K LIST OF ELASTICSEARCH QUERIES
425 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX L AWS SERVICES CLI COMMANDS
427 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX M LIST OF VAULT AND SECRET MANAGERS
429 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT
431 -
Download PDFRequires Authentication UnlicensedLicensed
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES
433 -
Download PDFRequires Authentication UnlicensedLicensed
INDEX
435
Publishing information
Pages and Images/Illustrations in book
eBook published on:
April 29, 2021
eBook ISBN:
9781683926849
Pages and Images/Illustrations in book
Main content:
444
eBook ISBN:
9781683926849