Review All Key Topics
Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 7-2 lists these key topics and the page number on which each is found.
Table 7-2 Key Topics for Chapter 7
Key Topic Element |
Description |
Page Number |
List |
Attacks against cloud technologies |
310 |
List |
Types of privilege escalation |
318 |
Paragraph |
Account takeover attacks |
318 |
List |
Attacks against misconfigured cloud assets |
320 |
Paragraph |
Cloud malware injection attacks |
323 |
Paragraph |
How SDKs can provide insights about cloud-hosted applications and the underlying infrastructure |
324 |
List |
Techniques used to compromise mobile devices |
324 |
List |
Prevalent vulnerabilities affecting mobile devices |
325 |
List |
Tools for performing security research and testing the security posture of mobile devices |
327 |
List |
Common network protocols for IoT implementations |
328 |
List |
Special considerations for securing IoT implementations |
329 |
List |
Common security vulnerabilities affecting IoT implementations |
330 |
List |
Common misconfiguration of IoT devices and cloud-based solutions |
331 |
Paragraph |
Management interface vulnerabilities |
332 |
List |
Vulnerabilities in virtualized environments |
333 |