Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---
 Online-Ressource
Verfasst von:Das, Ravindra [VerfasserIn]   i
Titel:The zero trust framework
Titelzusatz:threat hunting & quantum mechanics
Verf.angabe:Ravindra Das
Verlagsort:Boca Raton
Verlag:CRC Press
Jahr:2023
Umfang:1 online resource (152 pages)
Illustrationen:illustrations (black and white).
Fussnoten:Includes bibliographical references and index. - Print version record
ISBN:978-1-000-92249-3
 1-000-92249-9
 978-1-000-92247-9
 1-000-92247-2
Abstract:The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
URL:Aggregator: https://learning.oreilly.com/library/view/-/9781000922493/?ar
Datenträger:Online-Ressource
Sprache:eng
Bibliogr. Hinweis:Erscheint auch als : Druck-Ausgabe
Sach-SW:Réseaux d'ordinateurs ; Sécurité ; Mesures
 Sécurité informatique
 Confiance
 Internautes ; Identification
 Computer networks ; Security measures
 Computer security
 Trust
K10plus-PPN:1871288177
 
 
Lokale URL UB: Zum Volltext
 
 Bibliothek der Medizinischen Fakultät Mannheim der Universität Heidelberg
 Klinikum MA Bestellen/Vormerken für Benutzer des Klinikums Mannheim
Eigene Kennung erforderlich
Bibliothek/Idn:UW / m4418446117
Lokale URL Inst.: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/69146780   QR-Code
zum Seitenanfang