Guidelines for Digital Identity Verification.:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Nova Science Publishers, Inc.,
2023.
|
Schriftenreihe: | Privacy and identity protection.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Description based upon print version of record. 2. Product Installation Guides |
Beschreibung: | 1 online resource (252 p.). |
ISBN: | 9798886979299 |
Internformat
MARC
LEADER | 00000cam a22000007i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1381095286 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 230610s2023 nyu o ||| 0 eng d | ||
040 | |a EBLCP |b eng |e rda |c EBLCP |d YDX |d UKAHL |d OCLCF |d OCLCQ |d OCLCO |d N$T | ||
019 | |a 1381074725 | ||
020 | |a 9798886979299 |q (electronic bk.) | ||
020 | |z 9798886978384 | ||
035 | |a (OCoLC)1381095286 |z (OCoLC)1381074725 | ||
050 | 4 | |a TK5105.59 |b .S65 2023 | |
082 | 7 | |a 005.8 |2 23/eng/20230628 | |
049 | |a MAIN | ||
100 | 1 | |a Solis, Damon. | |
245 | 1 | 0 | |a Guidelines for Digital Identity Verification. |
264 | 1 | |a New York : |b Nova Science Publishers, Inc., |c 2023. | |
300 | |a 1 online resource (252 p.). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Privacy and Identity Protection | |
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components | |
505 | 8 | |a 3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points | |
505 | 8 | |a 3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination | |
505 | 8 | |a 5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks) | |
505 | 8 | |a 5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview | |
500 | |a 2. Product Installation Guides | ||
650 | 0 | |a Internet |x Security measures. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 7 | |a Internet |x Security measures |2 fast | |
776 | 0 | 8 | |i Print version: |a Solis, Damon |t Guidelines for Digital Identity Verification |d New York : Nova Science Publishers, Incorporated,c2023 |z 9798886978384 |
830 | 0 | |a Privacy and identity protection. |0 http://id.loc.gov/authorities/names/no2013107555 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3616053 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH41500488 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL30545284 | ||
938 | |a YBP Library Services |b YANK |n 305416803 | ||
938 | |a EBSCOhost |b EBSC |n 3616053 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1381095286 |
---|---|
_version_ | 1816882570157096960 |
adam_text | |
any_adam_object | |
author | Solis, Damon |
author_facet | Solis, Damon |
author_role | |
author_sort | Solis, Damon |
author_variant | d s ds |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .S65 2023 |
callnumber-search | TK5105.59 .S65 2023 |
callnumber-sort | TK 45105.59 S65 42023 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components 3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points 3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination 5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks) 5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview |
ctrlnum | (OCoLC)1381095286 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04808cam a22005057i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1381095286</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">230610s2023 nyu o ||| 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">EBLCP</subfield><subfield code="d">YDX</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1381074725</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798886979299</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798886978384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1381095286</subfield><subfield code="z">(OCoLC)1381074725</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S65 2023</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230628</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Solis, Damon.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guidelines for Digital Identity Verification.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Nova Science Publishers, Inc.,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (252 p.).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Privacy and Identity Protection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">2. Product Installation Guides</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Solis, Damon</subfield><subfield code="t">Guidelines for Digital Identity Verification</subfield><subfield code="d">New York : Nova Science Publishers, Incorporated,c2023</subfield><subfield code="z">9798886978384</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Privacy and identity protection.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2013107555</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3616053</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH41500488</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL30545284</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">305416803</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3616053</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1381095286 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:42Z |
institution | BVB |
isbn | 9798886979299 |
language | English |
oclc_num | 1381095286 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (252 p.). |
psigel | ZDB-4-EBA |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Nova Science Publishers, Inc., |
record_format | marc |
series | Privacy and identity protection. |
series2 | Privacy and Identity Protection |
spelling | Solis, Damon. Guidelines for Digital Identity Verification. New York : Nova Science Publishers, Inc., 2023. 1 online resource (252 p.). text txt rdacontent computer c rdamedia online resource cr rdacarrier Privacy and Identity Protection Description based upon print version of record. Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components 3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points 3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination 5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks) 5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview 2. Product Installation Guides Internet Security measures. Internet Sécurité Mesures. Internet Security measures fast Print version: Solis, Damon Guidelines for Digital Identity Verification New York : Nova Science Publishers, Incorporated,c2023 9798886978384 Privacy and identity protection. http://id.loc.gov/authorities/names/no2013107555 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3616053 Volltext |
spellingShingle | Solis, Damon Guidelines for Digital Identity Verification. Privacy and identity protection. Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components 3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points 3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination 5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks) 5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview Internet Security measures. Internet Sécurité Mesures. Internet Security measures fast |
title | Guidelines for Digital Identity Verification. |
title_auth | Guidelines for Digital Identity Verification. |
title_exact_search | Guidelines for Digital Identity Verification. |
title_full | Guidelines for Digital Identity Verification. |
title_fullStr | Guidelines for Digital Identity Verification. |
title_full_unstemmed | Guidelines for Digital Identity Verification. |
title_short | Guidelines for Digital Identity Verification. |
title_sort | guidelines for digital identity verification |
topic | Internet Security measures. Internet Sécurité Mesures. Internet Security measures fast |
topic_facet | Internet Security measures. Internet Sécurité Mesures. Internet Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3616053 |
work_keys_str_mv | AT solisdamon guidelinesfordigitalidentityverification |