Summary
In this chapter, we covered how cloud computing is a benefit, and also how it may be a challenge for us to secure. We discussed some ways in which the cloud is vulnerable to being attacked. We shared some of the tools and techniques attackers may use. And finally, we talked about some best practices to help you secure the cloud.
The important thing to remember is that many of the same weaknesses and attacks we see within the cloud are the same as what we've learned about on our normal networks and that they are just as much of a target for attackers.
In the next chapter, we'll talk about how the attackers look at cryptography and what we can do about it.