Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: The Zero Trust Framework and Privileged Access Management (PAM)
Автор: Ravindra Das
Издательство: CRC Press
Год: 2024
Страниц: 126
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.

Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.

However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.

As it was alluded to in great detail throughout this book, one of the primary goals of both the Zero Trust Framework and Privileged Access is to not only enforce Multifactor Authentication (MFA) but also, as much as possible, try to get rid of the usage of passwords altogether. As we all know, passwords can be extremely pesky, especially if you have to abide by company policy to create long and complex passwords. But passwords have been around for quite some time, and the unfortunate part about this is that they will continue to be so, for a long time to come. This is even despite the fact that there are a number of other viable solutions that are available, such as the use of Biometric technologies as reviewed earlier in this book. Some of the most robust modalities that one can use in this regard are Fingerprint Recognition, Facial Recognition, and Iris Recognition. There are other Biometric-based modalities that a business can use, but they don’t have a wide-reaching market, at least as of yet.

Скачать The Zero Trust Framework and Privileged Access Management (PAM)









НЕ РАБОТАЕТ TURBOBIT.NET? ЕСТЬ РЕШЕНИЕ, ЖМИ СЮДА!





Автор: Ingvar16 18-02-2024, 05:54 | Напечатать | СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:
    {related-news}

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности