
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
Chapter in the book
Publisher:Mercury Learning and Information
By: Aditya K. Sood
Paid access
|Apr 2021Table of contents
Frontmatter
CONTENTS
PREFACE
ACKNOWLEDGMENTS
ABOUT THE AUTHOR
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT
CHAPTER 8 PRIVACY IN THE CLOUD
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD
CONCLUSION
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE
APPENDIX B LIST OF SERVERLESS FRAMEWORKS
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES
APPENDIX K LIST OF ELASTICSEARCH QUERIES
APPENDIX L AWS SERVICES CLI COMMANDS
APPENDIX M LIST OF VAULT AND SECRET MANAGERS
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES
INDEX
33 chapters available
PDF preview is not available for this content.
PDF ISBN: 978-1-68392-684-9 | E-Pub ISBN: 978-1-68392-683-2 | DOI: https://doi.org/10.1515/9781683926849
Publisher: Mercury Learning and Information
Copyright owner: © 2021 Walter de Gruyter GmbH, Berlin/Boston
Publication date: 2021
Language: English
Pages: 444
Related subjects:
