HOME > 상세정보

상세정보

The zero trust framework : threat hunting & quantum mechanics / 1st ed

The zero trust framework : threat hunting & quantum mechanics / 1st ed

자료유형
단행본
개인저자
Das, Ravindra
서명 / 저자사항
The zero trust framework : threat hunting & quantum mechanics / Ravindra Das.
판사항
1st ed.
발행사항
Boca Raton :   CRC Press,   2024.  
형태사항
xi, 145 p. : ill. ; 23 cm.
총서사항
CRC focus series
ISBN
9781032492780 9781032492810
요약
"The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Even despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not to participate in. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography"--Provided by publisher.
서지주기
Includes bibliographical references and index.
일반주제명
Computer networks --Security measures. Computer security. Trust. Internet users --Identification.
000 00000cam u2200205 a 4500
001 000046168525
005 20240131164111
008 240104s2024 flua b 001 0 eng
010 ▼a 2023006003
020 ▼a 9781032492780 ▼q (hardback)
020 ▼a 9781032492810 ▼q (paperback)
020 ▼z 9781003392965 ▼q (ebook)
035 ▼a (KERIS)REF000020161492
040 ▼a DLC ▼b eng ▼e rda ▼c DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK5105.59 ▼b .D3738 2024
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b D229z
100 1 ▼a Das, Ravindra ▼0 AUTH(211009)161566.
245 1 4 ▼a The zero trust framework : ▼b threat hunting & quantum mechanics / ▼c Ravindra Das.
250 ▼a 1st ed.
260 ▼a Boca Raton : ▼b CRC Press, ▼c 2024.
264 1 ▼a Boca Raton : ▼b CRC Press, ▼c [2024]
300 ▼a xi, 145 p. : ▼b ill. ; ▼c 23 cm.
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a unmediated ▼b n ▼2 rdamedia
338 ▼a volume ▼b nc ▼2 rdacarrier
490 1 ▼a CRC focus series
504 ▼a Includes bibliographical references and index.
520 ▼a "The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Even despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not to participate in. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography"--Provided by publisher.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Computer security.
650 0 ▼a Trust.
650 0 ▼a Internet users ▼x Identification.
830 0 ▼a CRC focus series.
945 ▼a ITMT

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 D229z 등록번호 121265411 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning.

Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Even despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things.

So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not to participate in. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time.

The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA).

In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.



In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.




정보제공 : Aladin

목차

1. Introduction. 2. The Fundamental Components of the Zero Trust Framework. 3. The Public Key Infrastructure and Bio Cryptography. 4. The Zero Trust Framework. 5. Threat Modeling/Threat Hunting. 6. Conclusions.

관련분야 신착자료

Harvard Business Review (2025)