Have a personal or library account? Click
here
to login
Paradigm
reference-global.com
Content
Services
Paradigm
Partners
Contact
Books
Empirical Cloud Security
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
Chapter in the book
Empirical Cloud Security
Publisher:
Mercury Learning and Information
By:
Aditya K. Sood
Paid access
|
Apr 2021
Book details
Table of contents
Table of contents
Frontmatter
CONTENTS
PREFACE
ACKNOWLEDGMENTS
ABOUT THE AUTHOR
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT
CHAPTER 8 PRIVACY IN THE CLOUD
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD
CONCLUSION
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE
APPENDIX B LIST OF SERVERLESS FRAMEWORKS
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES
APPENDIX K LIST OF ELASTICSEARCH QUERIES
APPENDIX L AWS SERVICES CLI COMMANDS
APPENDIX M LIST OF VAULT AND SECRET MANAGERS
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES
INDEX
33 chapters available
PDF preview is not available for this content.
PDF ISBN:
978-1-68392-684-9
|
E-Pub ISBN:
978-1-68392-683-2
|
DOI:
10.1515/9781683926849
Publisher:
Mercury Learning and Information
Copyright owner:
© 2021 Walter de Gruyter GmbH, Berlin/Boston
Publication date:
2021
Language:
English
Pages:
444
Related subjects:
Computer sciences
,
Computer sciences, other
Previous chapter
Empirical Cloud Security
Next chapter