Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

  • 5h 10m
  • Aditya K. Sood
  • Mercury Learning
  • 2021

This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.

Features

  • Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applications
  • Covers topics such as cloud architecture and security fundamentals, database and storage security, data privacy, security and risk assessments, controls related to continuous monitoring, and more
  • Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread malware including preventative measures

Brief Table of Contents

1: Cloud Architecture and Security Fundamentals. 2: IAM for Authentication and Authorization. 3: Cloud Infrastructure. 4: Database and Storage Services. 5: Design and Analysis of Cryptography Controls. 6: Cloud Applications. 7: Cloud Monitoring and Logging. 8: Privacy in the Cloud. 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments. 10: Malicious Code in the Cloud. 11. Threat Intelligence and Malware Protection in the Cloud. Conclusion. Appendices. Index.

In this Book

  • Cloud Architecture and Security Fundamentals
  • IAM for Authentication and Authorization: Security Assessment
  • Cloud Infrastructure: Network Security Assessment
  • Database and Storage Services: Security Assessment
  • Design and Analysis of Cryptography Controls: Security Assessment
  • Cloud Applications: Secure Code Review
  • Cloud Monitoring and Logging: Security Assessment
  • Privacy in the Cloud
  • Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
  • Malicious Code in the Cloud
  • Threat Intelligence and Malware Protection in the Cloud
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 440 users Rating 4.6 of 440 users (440)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.6 of 1773 users Rating 4.6 of 1773 users (1773)