000 | 04924cam a22005417i 4500 | ||
---|---|---|---|
001 | on1381095286 | ||
003 | OCoLC | ||
005 | 20241121073150.0 | ||
006 | m d | ||
007 | cr cnu---unuuu | ||
008 | 230610s2023 nyu o ||| 0 eng d | ||
040 |
_aEBLCP _beng _erda _cEBLCP _dYDX _dUKAHL _dOCLCF _dOCLCQ _dOCLCO _dN$T |
||
019 | _a1381074725 | ||
020 |
_a9798886979299 _q(electronic bk.) |
||
020 | _z9798886978384 | ||
035 |
_a3616053 _b(N$T) |
||
035 |
_a(OCoLC)1381095286 _z(OCoLC)1381074725 |
||
050 | 4 |
_aTK5105.59 _b.S65 2023 |
|
082 | 0 | 4 |
_a005.8 _223/eng/20230628 |
049 | _aMAIN | ||
100 | 1 |
_aSolis, Damon. _924328 |
|
245 | 1 | 0 | _aGuidelines for Digital Identity Verification. |
264 | 1 |
_aNew York : _bNova Science Publishers, Inc., _c2023. |
|
300 | _a1 online resource (252 p.). | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aPrivacy and Identity Protection | |
500 | _aDescription based upon print version of record. | ||
505 | 0 | _aIntro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components | |
505 | 8 | _a3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points | |
505 | 8 | _a3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination | |
505 | 8 | _a5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks) | |
505 | 8 | _a5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview | |
500 | _a2. Product Installation Guides | ||
590 | _aAdded to collection customer.56279.3 | ||
650 | 0 |
_aInternet _xSecurity measures. _924329 |
|
650 | 6 |
_aInternet _xS�ecurit�e _xMesures. _924330 |
|
650 | 7 |
_aInternet _xSecurity measures _2fast _924329 |
|
776 | 0 | 8 |
_iPrint version: _aSolis, Damon _tGuidelines for Digital Identity Verification _dNew York : Nova Science Publishers, Incorporated,c2023 _z9798886978384 |
830 | 0 |
_aPrivacy and identity protection. _924331 |
|
856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3616053 |
938 |
_aAskews and Holts Library Services _bASKH _nAH41500488 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL30545284 |
||
938 |
_aYBP Library Services _bYANK _n305416803 |
||
938 |
_aEBSCOhost _bEBSC _n3616053 |
||
994 |
_a92 _bN$T |
||
999 |
_c8946 _d8946 |