© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_4

4. Cloud Definitions

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 

Without a doubt, the cloud has changed the way we do business. The growth of the cloud has also given rise to many marketing buzzwords, such as “digital transformation” and “zero trust.” However, while these terms push the use cases and architectures for cloud deployments to new levels, cloud deployments have pushed several industry standard terms to evolve to include the cloud in their definitions.

We can no longer think of an identity ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.