Empirical Cloud Security : : Practical Intelligence to Evaluate Risks and Attacks / / Aditya K. Sood.
The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2023] ©2023 |
Year of Publication: | 2023 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (XXV, 475 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Other title: | Frontmatter -- Contents -- Preface -- About the Author -- Chapter 1: Cloud Architecture and Security Fundamentals -- Chapter 2: IAM for Authentication and Authorization: Security Assessment -- Chapter 3: Cloud Infrastructure: Network Security Assessment -- Chapter 4: Database and Storage Services: Security Assessment -- Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment -- Chapter 6: Cloud Applications: Secure Code Review -- Chapter 7: Cloud Monitoring and Logging: Security Assessment -- Chapter 8: Privacy in the Cloud -- Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments -- Chapter 10: Malicious Code in the Cloud -- Chapter 11: Threat Intelligence and Malware Protection in the Cloud -- Appendix A: List of Serverless Computing Services -- Appendix B: List of Serverless Frameworks -- Appendix C: List of Saas, Paas, Iaas, and Faas Providers -- Appendix D: List of Containerized Services and Open Source Software -- Appendix E: List of Critical RDP Vulnerabilities -- Appendix F: List of Network Tools and Scripts -- Appendix G: List of Databases Default TCP/UDP Ports -- Appendix H: List of Database Assessment Tools, Commands, and Scripts -- Appendix I: List of CouchDB API Commands and Resources -- Appendix J: List of CQLSH Cassandra Database SQL Queries -- Appendix K: List of Elasticsearch Queries -- Appendix L: AWS Services CLI Commands -- Appendix M: List of Vault and Secret Managers -- Appendix N: List of TLS Security Vulnerabilities for Assessment -- Appendix O: List of Cloud Logging and Monitoring Services -- Appendix P: Enterprise Threat Intelligence Platforms -- Index |
---|---|
Summary: | The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches on how to detect the security issues based on the intelligence gathered from the real world case studies and also discusses the recommendations to fix the security issues effectively. This book is not about general theoretical discussion rather emphasis is laid on the cloud security concepts and how to assess and fix them practically. |
Format: | Mode of access: Internet via World Wide Web. |
ISBN: | 9781501517990 9783111175782 9783111319292 9783111318912 9783111319124 9783111318165 9783111564340 9783111574073 9783111502496 |
DOI: | 10.1515/9781501517990 |
Access: | restricted access |
Hierarchical level: | Monograph |
Statement of Responsibility: | Aditya K. Sood. |