Book description
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
Table of contents
- Cover Page
- Half Title page
- Title Page
- Copyright Page
- Dedication
- Contents
- Acknowledgments
- 1 Introduction
-
2 The Fundamental Components of the Zero Trust Framework
- The Password
- The Rise of Two-Factor Authentication
- Multifactor Authentication
- An Introduction to Biometrics
- Definition and Unique Features
- The Process of Identification
- Other Important Concepts
- The Biometric Sensor
- A Review of Fingerprint Recognition
- A Review of Facial Recognition
- Iris Recognition
- Conclusions
- 3 The Public Key Infrastructure and BioCryptography
-
4 Quantum Physics
- The Origins of the Zero Trust Framework
- The Demise of Perimeter Security
- The Emergence of the Zero Trust Framework
- The Advantages of the Zero Trust Framework
- The Disadvantages of the Zero Trust Framework
- Some of the Best Practices
- The Flaws with the Traditional Zero Trust Framework Model
- The Use of Biometrics
- The Weakness of Repeated Authorization and Authentication
- The Strains of an On Prem PAM
- Why PAM Is Better Suited for the Cloud
- The Advantages of Using PAM in the Cloud
- A Best Practices Guide for Deploying a PAM-Based Solution
- The Mistakes that Are Made when Deploying PAM Solutions and How to Fix Them
- The Importance of Just in Time (JIT) Access
- The Four Pillars to PAM Success
- The Finer Points of Privileged Access Management
- The Use of Quantum Mechanics in Our Proposed Model of the Zero Trust Framework
- Quantum Cryptography
- The Literature Review
- The Quantum Key Distribution Center (QKDC)
- The Photon Particle Array Structures
- Our Proposed Zero Trust Framework Model
-
5 Threat Modeling/Threat Hunting
- What Exactly Is Threat Modeling?
- The Process Involved in Threat Modeling
- Making the Case for Threat Modeling
- How to Have Quality-Based Threat Modeling Meetings
- How to Carry Out Threat Modeling in the Software Development Lifecycle
- Valuing Your Threat Modelers
- Measuring the Overall Value of Threat Hunting
- When Does Threat Modeling End in the Project Management or SDLC?
- Another Way to Measure Threat Modeling Success
- Who Leads the Threat Modeling Team?
- Widely Used Threat Modeling Techniques
- Sources for Chapter 5
- 6 Conclusions
Product information
- Title: The Zero Trust Framework
- Author(s):
- Release date: May 2023
- Publisher(s): CRC Press
- ISBN: 9781000922493
You might also like
book
Zero Trust Architecture
Today's organizations need a new security model that more effectively adapts to the complexity and risks …
book
Zero Trust Networks, 2nd Edition
This practical book provides a detailed explanation of the zero trust security model. Zero trust is …
video
CompTIA Security+ SY0-701
27+ Hours of Video Instruction Get the edge you need to successfully study for the CompTIA …
book
API Security in Action
A web API is an efficient way to communicate with an application or service. However, this …