000 04924cam a22005417i 4500
001 on1381095286
003 OCoLC
005 20241121073150.0
006 m d
007 cr cnu---unuuu
008 230610s2023 nyu o ||| 0 eng d
040 _aEBLCP
_beng
_erda
_cEBLCP
_dYDX
_dUKAHL
_dOCLCF
_dOCLCQ
_dOCLCO
_dN$T
019 _a1381074725
020 _a9798886979299
_q(electronic bk.)
020 _z9798886978384
035 _a3616053
_b(N$T)
035 _a(OCoLC)1381095286
_z(OCoLC)1381074725
050 4 _aTK5105.59
_b.S65 2023
082 0 4 _a005.8
_223/eng/20230628
049 _aMAIN
100 1 _aSolis, Damon.
_924328
245 1 0 _aGuidelines for Digital Identity Verification.
264 1 _aNew York :
_bNova Science Publishers, Inc.,
_c2023.
300 _a1 online resource (252 p.).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aPrivacy and Identity Protection
500 _aDescription based upon print version of record.
505 0 _aIntro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components
505 8 _a3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points
505 8 _a3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination
505 8 _a5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks)
505 8 _a5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview
500 _a2. Product Installation Guides
590 _aAdded to collection customer.56279.3
650 0 _aInternet
_xSecurity measures.
_924329
650 6 _aInternet
_xS�ecurit�e
_xMesures.
_924330
650 7 _aInternet
_xSecurity measures
_2fast
_924329
776 0 8 _iPrint version:
_aSolis, Damon
_tGuidelines for Digital Identity Verification
_dNew York : Nova Science Publishers, Incorporated,c2023
_z9798886978384
830 0 _aPrivacy and identity protection.
_924331
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3616053
938 _aAskews and Holts Library Services
_bASKH
_nAH41500488
938 _aProQuest Ebook Central
_bEBLB
_nEBL30545284
938 _aYBP Library Services
_bYANK
_n305416803
938 _aEBSCOhost
_bEBSC
_n3616053
994 _a92
_bN$T
999 _c8946
_d8946