Azure Subscription

Azure Subscription is “a customer’s collection of services used in Azure. Some customers place all of their services in one subscription, whereas others may break them up by project or separate development and test environments from production. Subscriptions are identified primarily by a globally unique identifier (GUID), which might look like this: 59c7ae33-9be9-4b05-8cf3-6671d8b581db. Subscriptions can also have a friendly name, such as “Production Parking Registration System.”

Fair Use Source: B072SS34CP

See also Azure, Azure Services

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

  • Title: Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
  • Author: Matt Burrough
  • Print Length: 218 pages
  • Page Numbers Source ISBN: 1593278632
  • Publisher: No Starch Press
  • Publication Date: July 31, 2018
  • Sold by: Penguin Random House Publisher Services
  • ASIN: B072SS34CP

A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.

You’ll learn how to:

  • Find security issues related to multi-factor authentication and management certificates
  • Make sense of Azure’s services by using PowerShell commands to find IP addresses, administrative users, and firewall rules
  • Discover security configuration errors that could lead to exploits against Azure storage and keys
  • Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files
  • Penetrate networks by enumerating firewall rules
  • Investigate specialized services like Azure Key Vault and Azure Websites
  • Know when you might be caught by viewing logs and security events

Packed with real-world examples from the author’s experience as a corporate penetration tester, sample scripts from pen-tests and “Defenders Tips” that explain how companies can reduce risk, Pentesting Azure Applications provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.”

Fair Use Source: B072SS34CP

https://www.amazon.com/Pentesting-Azure-Applications-Definitive-Deployments-ebook/dp/B072SS34CP

Archiving

Archiving is “the process of moving old files off the file server to free up disk space for new files. If the old files are needed later, they can be unarchived and retrieved. Archived data can be saved to CD, DVD, or tape.”

Fair Use Source: B076J3QNB2

See also Cybersecurity Glossary

Application server

Application server is “a server that runs a networking application, such as an e-mail or database application. Application servers typically have a client that makes a connection to the application server from the user’s desktop.”

Fair Use Source: B076J3QNB2

See also Cybersecurity Glossary

Application layer

“The OSI layer that provides a consistent way for an application to make a network request. Examples of application-layer protocols are HTTP, SMTP, and FTP.”

Fair Use Source: B076J3QNB2

See also Cybersecurity Glossary

Analog modem

“A device used to connect to a remote network via a standard telephone (PSTN) line. Although there are many different types and makes of modems, they can be categorized into three areas: single external, single internal, and multiline rack-mounted.”

Fair Use Source: B076J3QNB2

See a Cybersecurity Glossary

ASCII – American Standard Code for Information Interchange

“A representation of standard alphabetic and other keyboard characters in a computer-readable, binary format.”

Fair Use Source: B076J3QNB2

See also DevSecOps, Cybersecurity, Cybersecurity Glossary, Privacy vs. Surveillance Topics