Home > Articles

This chapter is from the book

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 7-2 lists these key topics and the page number on which each is found.

Table 7-2 Key Topics for Chapter 7

Key Topic Element

Description

Page Number

List

Attacks against cloud technologies

310

List

Types of privilege escalation

318

Paragraph

Account takeover attacks

318

List

Attacks against misconfigured cloud assets

320

Paragraph

Cloud malware injection attacks

323

Paragraph

How SDKs can provide insights about cloud-hosted applications and the underlying infrastructure

324

List

Techniques used to compromise mobile devices

324

List

Prevalent vulnerabilities affecting mobile devices

325

List

Tools for performing security research and testing the security posture of mobile devices

327

List

Common network protocols for IoT implementations

328

List

Special considerations for securing IoT implementations

329

List

Common security vulnerabilities affecting IoT implementations

330

List

Common misconfiguration of IoT devices and cloud-based solutions

331

Paragraph

Management interface vulnerabilities

332

List

Vulnerabilities in virtualized environments

333

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.