Introduction-Basic Attacks and Defenses
Welcome to Cloud Security Basics
()
An overview of Cloud Security Basics
Introducing Internet Service Security
()
Introduction-Step 1: A Minimal Attack Surface
Step 1: Isolated Desktop Service
()
Scoring CIA Impacts
()
Attacking the Step 1 System
()
Introduction-Steps 2 and 3: Robustness
Step 2. Improved Robustness
()
Step 3. Separated Duties
()
User and Group Permissions
()
Introduction-Private Information and Internet Service Outlines
A Discussion Forum Scenario
()
Elements of an Internet Service Outline
()
Service Outline Example: Discussion Forum
()
Service Outline: Peer Review Assignment
()
Introduction-Additional Materials for use in this course
Scenario 1-The Costly Schedule
Scenario 2-The Discussion Forum
Chapters from "Authentication: From Passwords to Public Keys"
A Secure Network for a Private Cloud-Step 4 and Network Structure
Step 4. Adding Some Scale
()
Network Addressing
()
Network Protocol Layers
()
Networking Devices
()
A Secure Network for a Private Cloud-Network Traffic Filtering
Security Controls: Packet Filtering
()
Circuit and Content Control
()
A Secure Network for a Private Cloud-Cloud Service Outline Assignment
Cloud Service Outline for Peer Review
()
Cryptography for Remote Access and Support-Step 5 and Cryptographic Protection
Step 5: Remote Administration
()
Secret Sharing with Public-Key Crypto
()
Transport Layer Security
()
Cryptography for Remote Access and Support-Crypto Authentication
Hashing for Authentication
()
Network Authentication
()
TLS Message Integrity
()
Cryptography for Remote Access and Support-Server Authentication
Classic SSL/TLS Using the RSA Cipher
()
Authenticating Network Servers
()
Digital Signatures
()
Cryptography for Remote Access and Support-Public Key Certificates
Validating a Public-Key Certificate
()
Who Signs a Public-Key Certificate?
()
Delegation and Certificate Chains
()
Cryptography for Remote Access and Support-Securing Step 5
Securing the Step 5 Services
()
Cryptography for Remote Access and Support-CVSS Attack Assessment
Describing an Attack using CVSS
()
Assessing a Vulnerability with CVSS
()
Assessment of CVE-2019-9945
Step 6 and Cloud Security-Step 6 and Cloud Architecture
Step 6. Public Cloud Hosting
()
Deployment Models and Security
()
Cloud Service Architecture
()
Step 6 and Cloud Security-Virtualization
Computer System Virtualization
()
Process Virtualization
()
Network Virtualization
()
Protocol Layers and Cryptography
()
Step 6 and Cloud Security-Security Planning
Cloud Architecture and Security Planning
()
Notes on Constructing a Basic Cloud Security Plan