机读格式显示(MARC)
- 000 02877cam a2200373 i 4500
- 008 230210s2024 flua b 001 0 eng
- 020 __ |a 9781032492780 |q hardback
- 020 __ |a 9781032492810 |q paperback
- 020 __ |z 9781003392965 |q ebook
- 040 __ |a DLC |b eng |c DLC |e rda
- 050 00 |a TK5105.59 |b .D3738 2024
- 100 1_ |a Das, Ravindra, |e author.
- 245 14 |a The zero trust framework : |b threat hunting & quantum mechanics / |c Ravindra Das.
- 264 _1 |a Boca Raton : |b CRC Press, |c [2024]
- 300 __ |a xi, 145 pages : |b illustrations (black and white) ; |c 22 cm.
- 336 __ |a text |b txt |2 rdacontent
- 337 __ |a unmediated |b n |2 rdamedia
- 338 __ |a volume |b nc |2 rdacarrier
- 504 __ |a Includes bibliographical references and index.
- 490 0_ |a CRC focus series
- 520 __ |a "The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Even despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not to participate in. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography"-- |c Provided by publisher.
- 650 _0 |a Computer networks |x Security measures.
- 650 _0 |a Computer security.
- 650 _0 |a Internet users |x Identification.
- 950 __ |a SCNU |f TP393.08/D229