© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_2

2. Cloud Computing

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 

The move to cloud computing has accelerated rapidly in recent years, and there’s no slowdown on the horizon. Organizations are moving their infrastructure, including mission-critical systems, out of their direct control and onto platforms that are delivered and supported by cloud service providers (CSP). When we consider the value of the data that’s being processed and stored in the cloud, this is a move that might have seemed impossible, ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.