Buch, Englisch, 180 Seiten, Format (B × H): 155 mm x 235 mm
Leading to a Passwordless World
Buch, Englisch, 180 Seiten, Format (B × H): 155 mm x 235 mm
ISBN: 978-1-4842-9356-0
Verlag: Apress
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Chapter 1: Introduction to bookChapter 2: A Review Into Cryptography:The BasicsAn examination of the latest cryptography algorithmsA review of the PKIChapter 3: A Review Into The Biometrics Into the ZTF:Fundamentals of Iris Recognition and its algorithms (Gabor Wavelets)Fundamentals of Facial Recognition and its algorithms (Hidden Markov Models)Fundamentals of Fingerprint Recognition and its algorithms (Hexademcial Algorithms)Chapter 4: A Deep Dive Into BiocryptographyThe strength of the algorithmsWhy further encryption is needed (implementing cryptography over the Fingerprint, Iris, and Facial Recognition templates)Biocryptography from a one to many approachBiocryptography from a hosted approachChapter 5: The Zero Trust Framework (ZTF):What It isThe advantages/disadvantages of itHow Biometrics can play the role of MFA in the ZTFDetails about the point of authentication to the point of authorization for shared resources Once authenticated, the end user will not have to be authorized again – this is where the use of Privileged Access Management (PAM), Cloud Infrastructure Entitlements Management (CIEM), and Privileged Identity Management (PIM) will come into play, especially if the ZTF is going to be used in a hosted environment. The goal here is to eliminate the usage of passwords entirely.The need to make sure that the integrity of the Biometric Templates from the point of authentication to the point of authorization needs to be assured. Typically, Hashing Algorithms are used for this, but they too are prone to Cyberattacks.The next best thing to use is Quantum Mechanics and Photon Particle Array Structures. In theory, this has shown to be far superior to Hashing Algorithms. A discussion will be provided on this. So far, the assumption is that one user is using the ZTF. But in the real world, there will be hundreds of them. Therefore, the concepts of Quantum Key Distribution Centers will be discussed in the setting of a ZTF being deployed in a PKI infrastructure, where Public Keys and Private Keys are used.Chapter 6: ConclusionsUltimate goal is to have a passwordless organizationLogins are automaticUltimate goal is to get rid of the traditional of the traditional model of Perimeter Security, as everything is divided into zones with the ZTF.