eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 4 of 82

Table of Contents iii These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Table of Contents INTRODUCTION ............................................................................................... 1 About This Book ................................................................................... 2 Icons Used in This Book ....................................................................... 2 CHAPTER 1: The Evolution of the Data Center ................................... 3 Understanding the Impact of the Cloud on the Data Center.......... 3 Recognizing Security Challenges in the Data Center and Hybrid Cloud ................................................................................. 6 Looking at Why Legacy Security Infrastructure is Ineffective ......... 8 Firewalls ........................................................................................... 8 Intrusion prevention ....................................................................... 9 Proxies .............................................................................................. 9 Defining Security Requirements ....................................................... 10 Gain complete visibility ................................................................ 10 Minimize the attack surface......................................................... 11 Automate threat protection ........................................................ 11 CHAPTER 2: Security Challenges in Hybrid Clouds ....................... 15 Cloud Security and The Shared Responsibility Model ................... 15 The Dynamic Nature of Modern Threats ........................................ 21 Ransomware .................................................................................. 24 Credential theft ............................................................................. 25 DNS-based attacks ........................................................................ 27 Targeted "Low-and-Slow" Attacks and APTs.................................... 31 CHAPTER 3: Delivering Consistent Security Using Zero Trust ......................................................................... 33 Gaining Complete Visibility ............................................................... 34 Application identification ............................................................. 35 User identification......................................................................... 37 Content identification ................................................................... 38 Minimizing Your Attack Surface with Segmentation ...................... 39 Using Dynamic Security to Support Moves and Changes ............. 41

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies