Chapter 15: Cloud Computing

Cloud computing is a new technology that allows you to access computer applications, data storage, and webmail over the internet. The use of cloud computing enables a decentralized workforce while lowering operational costs and offering data security. Many organizations nowadays are moving their data and infrastructure to the cloud due to these advantages. However, the cloud environment likewise contains several dangers and risks for businesses. Attackers are exploiting security flaws in the cloud software to gain unlawful access to valuable data that is kept there.

Cloud security is becoming increasingly important for both individuals and organizations. This chapter explains the various methods for attacking the ...

Get Certified Ethical Hacker (CEH) v12 312-50 Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.