Empirical Cloud Security : : Practical Intelligence to Evaluate Risks and Attacks / / Aditya K. Sood.

The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2023]
©2023
Year of Publication:2023
Language:English
Online Access:
Physical Description:1 online resource (XXV, 475 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Other title:Frontmatter --
Contents --
Preface --
About the Author --
Chapter 1: Cloud Architecture and Security Fundamentals --
Chapter 2: IAM for Authentication and Authorization: Security Assessment --
Chapter 3: Cloud Infrastructure: Network Security Assessment --
Chapter 4: Database and Storage Services: Security Assessment --
Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment --
Chapter 6: Cloud Applications: Secure Code Review --
Chapter 7: Cloud Monitoring and Logging: Security Assessment --
Chapter 8: Privacy in the Cloud --
Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments --
Chapter 10: Malicious Code in the Cloud --
Chapter 11: Threat Intelligence and Malware Protection in the Cloud --
Appendix A: List of Serverless Computing Services --
Appendix B: List of Serverless Frameworks --
Appendix C: List of Saas, Paas, Iaas, and Faas Providers --
Appendix D: List of Containerized Services and Open Source Software --
Appendix E: List of Critical RDP Vulnerabilities --
Appendix F: List of Network Tools and Scripts --
Appendix G: List of Databases Default TCP/UDP Ports --
Appendix H: List of Database Assessment Tools, Commands, and Scripts --
Appendix I: List of CouchDB API Commands and Resources --
Appendix J: List of CQLSH Cassandra Database SQL Queries --
Appendix K: List of Elasticsearch Queries --
Appendix L: AWS Services CLI Commands --
Appendix M: List of Vault and Secret Managers --
Appendix N: List of TLS Security Vulnerabilities for Assessment --
Appendix O: List of Cloud Logging and Monitoring Services --
Appendix P: Enterprise Threat Intelligence Platforms --
Index
Summary:The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches on how to detect the security issues based on the intelligence gathered from the real world case studies and also discusses the recommendations to fix the security issues effectively. This book is not about general theoretical discussion rather emphasis is laid on the cloud security concepts and how to assess and fix them practically.
Format:Mode of access: Internet via World Wide Web.
ISBN:9781501517990
9783111175782
9783111319292
9783111318912
9783111319124
9783111318165
9783111564340
9783111574073
9783111502496
DOI:10.1515/9781501517990
Access:restricted access
Hierarchical level:Monograph
Statement of Responsibility: Aditya K. Sood.