Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Image from Google Jackets
Image from OpenLibrary

Guidelines for Digital Identity Verification.

By: Material type: TextTextSeries: Privacy and identity protectionPublisher: New York : Nova Science Publishers, Inc., 2023Description: 1 online resource (252 p.)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9798886979299
Subject(s): Additional physical formats: Print version:: Guidelines for Digital Identity VerificationDDC classification:
  • 005.8 23/eng/20230628
LOC classification:
  • TK5105.59 .S65 2023
Online resources:
Contents:
Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components
3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points
3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination
5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks)
5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Description based upon print version of record.

Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components

3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points

3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination

5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks)

5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview

2. Product Installation Guides

Added to collection customer.56279.3

There are no comments on this title.

to post a comment.