The zero trust framework: threat hunting & quantum mechanics
The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2023
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000922493/?ar |
Zusammenfassung: | The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (152 Seiten) illustrations (black and white). |
ISBN: | 9781000922493 1000922499 9781000922479 1000922472 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-098490885 | ||
003 | DE-627-1 | ||
005 | 20240228122015.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231127s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781000922493 |c electronic bk. |9 978-1-000-92249-3 | ||
020 | |a 1000922499 |c electronic bk. |9 1-000-92249-9 | ||
020 | |a 9781000922479 |c PDF ebook |9 978-1-000-92247-9 | ||
020 | |a 1000922472 |9 1-000-92247-2 | ||
035 | |a (DE-627-1)098490885 | ||
035 | |a (DE-599)KEP098490885 | ||
035 | |a (ORHE)9781000922493 | ||
035 | |a (DE-627-1)098490885 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Das, Ravindra |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The zero trust framework |b threat hunting & quantum mechanics |c Ravindra Das |
264 | 1 | |a Boca Raton |b CRC Press |c 2023 | |
300 | |a 1 Online-Ressource (152 Seiten) |b illustrations (black and white). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Trust | |
650 | 0 | |a Internet users |x Identification | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Confiance | |
650 | 4 | |a Internautes ; Identification | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Trust | |
776 | 1 | |z 9781032492780 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032492780 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000922493/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-098490885 |
---|---|
_version_ | 1821494936750522368 |
adam_text | |
any_adam_object | |
author | Das, Ravindra |
author_facet | Das, Ravindra |
author_role | aut |
author_sort | Das, Ravindra |
author_variant | r d rd |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)098490885 (DE-599)KEP098490885 (ORHE)9781000922493 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03510cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-098490885</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122015.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231127s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000922493</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-92249-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000922499</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-92249-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000922479</subfield><subfield code="c">PDF ebook</subfield><subfield code="9">978-1-000-92247-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000922472</subfield><subfield code="9">1-000-92247-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)098490885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP098490885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000922493</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)098490885</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Das, Ravindra</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The zero trust framework</subfield><subfield code="b">threat hunting & quantum mechanics</subfield><subfield code="c">Ravindra Das</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (152 Seiten)</subfield><subfield code="b">illustrations (black and white).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Trust</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet users</subfield><subfield code="x">Identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confiance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internautes ; Identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Trust</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032492780</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032492780</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000922493/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-098490885 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:18Z |
institution | BVB |
isbn | 9781000922493 1000922499 9781000922479 1000922472 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (152 Seiten) illustrations (black and white). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press |
record_format | marc |
spelling | Das, Ravindra VerfasserIn aut The zero trust framework threat hunting & quantum mechanics Ravindra Das Boca Raton CRC Press 2023 1 Online-Ressource (152 Seiten) illustrations (black and white). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography. Computer networks Security measures Computer security Trust Internet users Identification Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Confiance Internautes ; Identification Computer networks ; Security measures 9781032492780 Erscheint auch als Druck-Ausgabe 9781032492780 |
spellingShingle | Das, Ravindra The zero trust framework threat hunting & quantum mechanics Computer networks Security measures Computer security Trust Internet users Identification Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Confiance Internautes ; Identification Computer networks ; Security measures |
title | The zero trust framework threat hunting & quantum mechanics |
title_auth | The zero trust framework threat hunting & quantum mechanics |
title_exact_search | The zero trust framework threat hunting & quantum mechanics |
title_full | The zero trust framework threat hunting & quantum mechanics Ravindra Das |
title_fullStr | The zero trust framework threat hunting & quantum mechanics Ravindra Das |
title_full_unstemmed | The zero trust framework threat hunting & quantum mechanics Ravindra Das |
title_short | The zero trust framework |
title_sort | zero trust framework threat hunting quantum mechanics |
title_sub | threat hunting & quantum mechanics |
topic | Computer networks Security measures Computer security Trust Internet users Identification Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Confiance Internautes ; Identification Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Trust Internet users Identification Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Confiance Internautes ; Identification Computer networks ; Security measures |
work_keys_str_mv | AT dasravindra thezerotrustframeworkthreathuntingquantummechanics AT dasravindra zerotrustframeworkthreathuntingquantummechanics |