O'Reilly logo

The Cloud Security Ecosystem by Raymond Choo, Ryan Ko

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Note: Page numbers followed by b indicate boxes, f indicate figures, t indicate tables and np indicate footnotes.

A

Access control 411
Account hijacking 
defenses 70–71
impacts 71
risk rating 71, 73t
source 70
targets 71
vectors 70
vulnerabilities 70
AccountManager class 300–301
Account/service hijacking 415
Action phase 389, 393–394
Amazon Elastic Compute Cloud (Amazon EC2) 47, 49, 70
Amazon Web Services 350
American Institute of CPAs® (AICPA) 458
Android Debug Bridge (ADB) 288
Android devices 
ADB 288
analysis methodology  See (Evidence collection)
AndroidManifest.xml file 286
app access and secret keys 289
digital forensics 285, 288
evidentiary data 289
Linux-specific security features 286
location information 288–289
mobile device  ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required