- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
Andere Kunden interessierten sich auch für
- Daniel GonzalesUnclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks43,99 €
- Bradley WilsonA Methodology for Quantifying the Value of Cybersecurity Investments in the Navy25,99 €
- Quentin E HodgsonMany Hands in the Cookie Jar17,99 €
- James L BonomoMonitoring and Controlling the International Transfer of Technology17,99 €
- Farid A. KhavariTowards a Zero-Cost Economy16,99 €
- From Fome Zero to Zero Hunger85,99 €
- The Economic Development of Bangladesh within a Socialist Framework238,99 €
-
-
-
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 146
- Erscheinungstermin: 29. November 2024
- Englisch
- Abmessung: 216mm x 138mm
- ISBN-13: 9781032492810
- ISBN-10: 1032492813
- Artikelnr.: 71913167
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 146
- Erscheinungstermin: 29. November 2024
- Englisch
- Abmessung: 216mm x 138mm
- ISBN-13: 9781032492810
- ISBN-10: 1032492813
- Artikelnr.: 71913167
Ravindra Das is a Cybersecurity Consultant with his own practice, RaviDas.Tech, Inc. (ravidas.consulting). He is Certified in Cybersecurity by the ISC(2), and has written and published 9 books with CRC Press, and self-published 24 eBooks on Amazon. His portfolio can be seen at: cybersecuritycontent.news
Chapter 1: Introduction to book
Chapter 2: A Review Into Cryptography:
The Basics
An examination of the latest cryptography algorithms
A review of the PKI
Chapter 3: A Review Into The Biometrics Into the ZTF:
Fundamentals of Iris Recognition and its algorithms (Gabor Wavelets)
Fundamentals of Facial Recognition and its algorithms (Hidden Markov Models)
Fundamentals of Fingerprint Recognition and its algorithms (Hexademcial Algorithms)
Chapter 4: A Deep Dive Into Biocryptography
The strength of the algorithms
Why further encryption is needed (implementing cryptography over the Fingerprint, Iris, and Facial Recognition templates)
Biocryptography from a one to many approach
Biocryptography from a hosted approach
Chapter 5: The Zero Trust Framework (ZTF):
What It is
The advantages/disadvantages of it
How Biometrics can play the role of MFA in the ZTF
Details about the point of authentication to the point of authorization for shared resources
Once authenticated, the end user will not have to be authorized again - this is where the use of Privileged Access Management (PAM), Cloud Infrastructure Entitlements Management (CIEM), and Privileged Identity Management (PIM) will come into play, especially if the ZTF is going to be used in a hosted environment. The goal here is to eliminate the usage of passwords entirely.
The need to make sure that the integrity of the Biometric Templates from the point of authentication to the point of authorization needs to be assured. Typically, Hashing Algorithms are used for this, but they too are prone to Cyberattacks.
The next best thing to use is Quantum Mechanics and Photon Particle Array Structures. In theory, this has shown to be far superior to Hashing Algorithms. A discussion will be provided on this.
So far, the assumption is that one user is using the ZTF. But in the real world, there will be hundreds of them. Therefore, the concepts of Quantum Key Distribution Centers will be discussed in the setting of a ZTF being deployed in a PKI infrastructure, where Public Keys and Private Keys are used.
Chapter 6: Conclusions
Ultimate goal is to have a passwordless organization
Logins are automatic
Ultimate goal is to get rid of the traditional of the traditional model of Perimeter Security, as everything is divided into zones with the ZTF.
Chapter 2: A Review Into Cryptography:
The Basics
An examination of the latest cryptography algorithms
A review of the PKI
Chapter 3: A Review Into The Biometrics Into the ZTF:
Fundamentals of Iris Recognition and its algorithms (Gabor Wavelets)
Fundamentals of Facial Recognition and its algorithms (Hidden Markov Models)
Fundamentals of Fingerprint Recognition and its algorithms (Hexademcial Algorithms)
Chapter 4: A Deep Dive Into Biocryptography
The strength of the algorithms
Why further encryption is needed (implementing cryptography over the Fingerprint, Iris, and Facial Recognition templates)
Biocryptography from a one to many approach
Biocryptography from a hosted approach
Chapter 5: The Zero Trust Framework (ZTF):
What It is
The advantages/disadvantages of it
How Biometrics can play the role of MFA in the ZTF
Details about the point of authentication to the point of authorization for shared resources
Once authenticated, the end user will not have to be authorized again - this is where the use of Privileged Access Management (PAM), Cloud Infrastructure Entitlements Management (CIEM), and Privileged Identity Management (PIM) will come into play, especially if the ZTF is going to be used in a hosted environment. The goal here is to eliminate the usage of passwords entirely.
The need to make sure that the integrity of the Biometric Templates from the point of authentication to the point of authorization needs to be assured. Typically, Hashing Algorithms are used for this, but they too are prone to Cyberattacks.
The next best thing to use is Quantum Mechanics and Photon Particle Array Structures. In theory, this has shown to be far superior to Hashing Algorithms. A discussion will be provided on this.
So far, the assumption is that one user is using the ZTF. But in the real world, there will be hundreds of them. Therefore, the concepts of Quantum Key Distribution Centers will be discussed in the setting of a ZTF being deployed in a PKI infrastructure, where Public Keys and Private Keys are used.
Chapter 6: Conclusions
Ultimate goal is to have a passwordless organization
Logins are automatic
Ultimate goal is to get rid of the traditional of the traditional model of Perimeter Security, as everything is divided into zones with the ZTF.
Chapter 1: Introduction to book
Chapter 2: A Review Into Cryptography:
The Basics
An examination of the latest cryptography algorithms
A review of the PKI
Chapter 3: A Review Into The Biometrics Into the ZTF:
Fundamentals of Iris Recognition and its algorithms (Gabor Wavelets)
Fundamentals of Facial Recognition and its algorithms (Hidden Markov Models)
Fundamentals of Fingerprint Recognition and its algorithms (Hexademcial Algorithms)
Chapter 4: A Deep Dive Into Biocryptography
The strength of the algorithms
Why further encryption is needed (implementing cryptography over the Fingerprint, Iris, and Facial Recognition templates)
Biocryptography from a one to many approach
Biocryptography from a hosted approach
Chapter 5: The Zero Trust Framework (ZTF):
What It is
The advantages/disadvantages of it
How Biometrics can play the role of MFA in the ZTF
Details about the point of authentication to the point of authorization for shared resources
Once authenticated, the end user will not have to be authorized again - this is where the use of Privileged Access Management (PAM), Cloud Infrastructure Entitlements Management (CIEM), and Privileged Identity Management (PIM) will come into play, especially if the ZTF is going to be used in a hosted environment. The goal here is to eliminate the usage of passwords entirely.
The need to make sure that the integrity of the Biometric Templates from the point of authentication to the point of authorization needs to be assured. Typically, Hashing Algorithms are used for this, but they too are prone to Cyberattacks.
The next best thing to use is Quantum Mechanics and Photon Particle Array Structures. In theory, this has shown to be far superior to Hashing Algorithms. A discussion will be provided on this.
So far, the assumption is that one user is using the ZTF. But in the real world, there will be hundreds of them. Therefore, the concepts of Quantum Key Distribution Centers will be discussed in the setting of a ZTF being deployed in a PKI infrastructure, where Public Keys and Private Keys are used.
Chapter 6: Conclusions
Ultimate goal is to have a passwordless organization
Logins are automatic
Ultimate goal is to get rid of the traditional of the traditional model of Perimeter Security, as everything is divided into zones with the ZTF.
Chapter 2: A Review Into Cryptography:
The Basics
An examination of the latest cryptography algorithms
A review of the PKI
Chapter 3: A Review Into The Biometrics Into the ZTF:
Fundamentals of Iris Recognition and its algorithms (Gabor Wavelets)
Fundamentals of Facial Recognition and its algorithms (Hidden Markov Models)
Fundamentals of Fingerprint Recognition and its algorithms (Hexademcial Algorithms)
Chapter 4: A Deep Dive Into Biocryptography
The strength of the algorithms
Why further encryption is needed (implementing cryptography over the Fingerprint, Iris, and Facial Recognition templates)
Biocryptography from a one to many approach
Biocryptography from a hosted approach
Chapter 5: The Zero Trust Framework (ZTF):
What It is
The advantages/disadvantages of it
How Biometrics can play the role of MFA in the ZTF
Details about the point of authentication to the point of authorization for shared resources
Once authenticated, the end user will not have to be authorized again - this is where the use of Privileged Access Management (PAM), Cloud Infrastructure Entitlements Management (CIEM), and Privileged Identity Management (PIM) will come into play, especially if the ZTF is going to be used in a hosted environment. The goal here is to eliminate the usage of passwords entirely.
The need to make sure that the integrity of the Biometric Templates from the point of authentication to the point of authorization needs to be assured. Typically, Hashing Algorithms are used for this, but they too are prone to Cyberattacks.
The next best thing to use is Quantum Mechanics and Photon Particle Array Structures. In theory, this has shown to be far superior to Hashing Algorithms. A discussion will be provided on this.
So far, the assumption is that one user is using the ZTF. But in the real world, there will be hundreds of them. Therefore, the concepts of Quantum Key Distribution Centers will be discussed in the setting of a ZTF being deployed in a PKI infrastructure, where Public Keys and Private Keys are used.
Chapter 6: Conclusions
Ultimate goal is to have a passwordless organization
Logins are automatic
Ultimate goal is to get rid of the traditional of the traditional model of Perimeter Security, as everything is divided into zones with the ZTF.